Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.

Slides:



Advertisements
Similar presentations
Networks & Components Discuss the components required for successful communications Explain the purpose of communications software Identify various sending.
Advertisements

INTRODUCTION TO COMPUTER NETWORKS Zeeshan Abbas. Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Wi-Fi Structures.
+ Architecture, Firewalls and Proxy Servers Networks.
Principles of Information Technology
1 Networking A computer network is a collection of computing devices that are connected in various ways in order to communicate and share resources. The.
A Guide to major network components
Computer Networks IGCSE ICT Section 4.
ITGS Networks Based on the textbook “Information Technology in a Global Society for the IB Diploma” by Stuart Gray.
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
Network and WiFi By: Clara-Hannah S., Amelia H., and Margot d’I.
NETWORK CHONGSEOK PARK 10DD MRS. VEENA MONY Content.
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
Networking Components Christopher Biles LTEC Assignment 3.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module E Network Basics.
Chapter 4: Computer Networks
CHAPTER OVERVIEW SECTION 7.1 – Connectivity: The Business Value of a Networked World Overview of a Connected World Benefits of a Connected World Challenges.
PowerPoint Presentation to Accompany Chapter 9 Networks & Communications Visualizing TechnologyCopyright © 2014 Pearson Education, Inc. Publishing as Prentice.
Networks. What is a Network? Two or more computers linked together so they can send and receive data. We use them for sending s, downloading files,
Stefan Thorvaldsson – What is a network? A network is two or more computer linked together so the are able to share resources. It could.
A look at networking and its main components. NETWORK A network is a group of connected computers that allow people to share information and equipment.
Networks A network is a collection of computers and devices connected together via communications devices and transmission media Advantages of a network.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
Networking Two or more computers linked together so that it is capable of sending messages between them. Network Stand Alone Computer.
Networked Information Systems 1 Advantages of and classified by their size & architecture or design.
Unit 1—Computer Basics Lesson 7 Networks.
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
Wireless or wired connection of the technician’s smartphone to Cable Ties network.
Computer Networks S3 Prepared by May Lau
Web Page Design I Basic Computer Terms “How the Internet & the World Wide Web (www) Works”
Royal Latin School. Spec Coverage: a) Explain the advantages of networking stand-alone computers into a local area network e) Describe the differences.
ITGS Types of network.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
Computers Are Your Future Eleventh Edition
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Transferring data.  Most commercial computer users need to allow their employees to share data.  It also needs more than one employee to access the.
Using ICT systems The computer. Using ICT systems Computers in an ICT System Multiple computers, usually with username and password entry Looking after.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Networks Am I hooked up?. Networks definition sizes of networks types advantages and disadvantages how data is sent transmission media business uses.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
Mr C Johnston ICT Teacher G055 - Lecture 03 Local and Wide Area Networks.
Networking Basics 8th Grade
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Higher Computing Networking. Networking – Local Area Networks.
Communications & Networks National 4 & 5 Computing Science.
By: Nathan Narvaez. A system that links together electronic office equipment, such as computers and word processors, and forms a network within an office.
CHAPTER - 4 COMPUTER NETWORK Dr. BALAMURUGAN MUTHURAMAN
Networks The Big Picture. Three Great Leaps of Civilization.
Lesson 7 Networks Unit 1—Computer Basics. Computer Concepts BASICS - 2 Objectives Describe the benefits and disadvantages of networks. List and describe.
ITE PC v4.0 Chapter 8 1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public  Networks are systems that are formed by links.  People use different.
INTRODUCTION TO COMPUTER NETWORKING  Definition of computer network  Devices that could be connected to the network  Connection media  Resources shared.
Introduction to Networks. When Personal Computers first appeared in business, software programs were designed for a single user. However as computers.
Chapter 3.  Help you understand what hardware is required to allow networks to work including: ◦ Repeaters ◦ Hub ◦ Switch ◦ Bridge ◦ Gateway (not needed.
2.2 Interfacing Computers MR JOSEPH TAN CHOO KEE TUESDAY 1330 TO 1530
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
ICT Unit 4: Network and the effects of using them
1.4 wired and wireless networks lesson 1
Unit Communication Hardware
Networks and Communication
Network Models, Hardware, Protocols and number systems
Firewalls Routers, Switches, Hubs VPNs
Networks 1 Key Revision Points.
Networks and Topologies
ICT Computing Lesson 4: Computing Network.
Principles of Information Technology
Presentation transcript:

Mohammed F & Aya

Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each computer shares their own files where other computers can access them with the correct permissions. An example would be that it has a similarity to Facebook although, the information saved onto the computers has no privacy and anybody can access it from any other computer. However, this method of sharing information can be illegal due to spreading copyrighted material, though they have many legitimate uses.

A Firewall is hardware or software that determines which data is allowed to enter and leave the network. Firewalls are built into the computers / laptops or it can be built into network routers, firewalls can be installed on desktops those are referred as personal firewall. Firewalls are meant to help secure a computer by preventing any access from external unauthorised users, and to control which users and programs are allowed to connect to external network such as the internet. Firewalls can be arranged to allow or block traffic using a number of methods which are: IP addresses: Gives a unique number to each user on the computer. IP addresses of specific computers can be allowed or denied access. Domain names: access to particular web sites, such as social networks, can be blocked by specifying their name. Protocols & ports: There are different types of protocol’s such as HTTP, SMTP, POP3 and FTP these can be blocked or allowed. Either protocol or port can be blocked. Application program- Individual programs can be granted or denied network access.

They act as a middle step between two computers. All communication between the two passes through the proxy, which allows it to perform a number of tasks including caching, filtering and logging data. Proxy servers are a common way to implement firewall functionality and record logs of users’ web activity. Caching: It is used to speed up activities such as web browsing. Proxy servers keep a copy of commonly requested material, such as web page, in a storage are called a cache.

Provides networking capabilities to a group of computers within close proximity. Common places: Offices, Schools, Hospitals & home. Mostly LAN’s are connected together through Ethernet cables to hubs & routers(expensive equipment). Advantages include, local communication, easy file sharing & sharing of ISP. Disadvantages include, privacy of data shared over the network is under threat as it is going through the open before being received by the recipient. Virus threat as computers are not stand alone (if connected to the internet).

1.Servers: Many types of servers, most common is the file server providing the ability to save files on the network and can be accessed by any computer connected. 2.All Computers connected physically using an Ethernet cable to either a central server or a router/hub.

LAN format however access is granted through wireless means, mostly wireless fidelity (Wi-Fi). Almost all WLAN’s require authentication details to be entered before access can be granted, mostly in the form of username & password. Not only wirelessly capable computers, but smartphones, PDA’s and tablets can also access the WLAN providing that the authentication is genuine. WLAN’s may also be provided for the public to access the internet at places called hotspots, i.e. coffee shops.

A computer network organized by connecting two devices together, commonly using wireless means. For example connecting your phone to your computer using Bluetooth to browse the content stored is creating a PAN. PAN is most commonly used to transfer data/media between two devices, which is why the distance required to connect is very minimal. Most common example: Synchronising your Apple device with iTunes using both Wi-Fi or USB connections.

MAN: A network covering a very large area/campus, much like our very school. MAN is a series of LAN’s connected together which provides a time efficient solution of sharing information over great distances. Further LARGE connections are known as WAN’s, often used by business & banks across cities. For such large networks, the central hub/bridge is often a satellite which uses high frequency radio waves & microwaves to transmit the shared information from one branch to the other. Therefore it explains the antennae's on top of the office branches.

A network established to provide a non local place to save your data. It appears as though it is a connected hard disk however is located & accessed remotely. Most commonly used in office LAN’s however using Apple’s Time Capsule, it is now available at home as well. Video Link

WAN’s often communicate between each other and the exchange of data needs to separately encrypted and sent in order to keep the data secure. VPN is a form of a secure tunnel which protects the flowing data from prying eyes. An example of using a VPN on personal basis includes protecting your web history whilst using a public network. Examples of VPN’s include Hotspot Shield & Spotflux.

Similar concept to VPN’s, geographically separated computers or LAN’s are connected together rather than individual computers. It provides a better form or communication for businesses & companies located all across the country, or indeed, the globe.

Time Capsule Issue VPN’s used to protect browsing data at Starbucks