Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.

Slides:



Advertisements
Similar presentations
Internet Hardware Connected ‘Servers’ Servers provide: – Web pages – – File downloads.
Advertisements

Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013 Connecting.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
Unit 9 Network Fundamentals. Describe a network Explain the benefits of a network Identify risks in computing Describe the roles of clients & servers.
Networks: LANs File Server : Runs software, stores files. Terminals : Workstations that give network access. Print Server : Queues up all print jobs from.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
Wi-Fi Structures.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
1 Wireless LANs. 2 Introduction Types of Communication Networks. LAN’s Configurations. Wireless Technology. –Definition. –Applications. –Example. Communications.
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
Securing a Wireless Network
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
Unit 8 Network Fundamentals Describe a network Explain the benefits of a network Identify risks in computing Describe the roles of clients & servers.
Basic Data Communication
Communications & Networks
CHAPTER OVERVIEW SECTION 7.1 – Connectivity: The Business Value of a Networked World Overview of a Connected World Benefits of a Connected World Challenges.
Telecommunications and Networks Chapter 6 – Understanding Technology (Third Edition)
Router. Introduction A router is a device in computer networking that forwards data packets to their destinations, based on their addresses. The work.
Wireless Networking and Security
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
© Paradigm Publishing Inc. 6-1 Chapter 6 Telecommunications and Networks.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Chapter 4 Computer Networks – Part 1
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-in 5 NETWORKS and TELECOMMUNICATIONS.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
Wireless or wired connection of the technician’s smartphone to Cable Ties network.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 CHAPTER 3 Created by, David Zolzer, Northwestern State University—Louisiana The Internet and World Wide.
Computer Concepts 2014 Chapter 5 Local Area Networks.
OCR Cambridge National ICT Mr Conti 10X 25 th April 2014.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Introduction to Information Systems Lecture 06 Telecommunications and Networks Business Value of Networks Jaeki Song.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Communication Systems The Internet The largest wide area network in the world. It is made up of thousands of linked networks. What.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
Protocols Monil Adhikari. Agenda Introduction Port Numbers Non Secure Protocols FTP HTTP Telnet POP3, SMTP Secure Protocols HTTPS.
Networking Network Classification, by there: 3 Security And Communications software.
science/internet-intro
Peer to peer networks. Peer to peer is when digital devices communicate wirelessly with each others without the need for a transmitter. Wi-Fi Direct 1-
Networks The Big Picture. Three Great Leaps of Civilization.
The Internet Technological Background. Topic Objectives At the end of this topic, you should be able to do the following: Able to define the Internet.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 9 Networks and Communications.
Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.
Network media, protocols and networking standards, networking hardware.
Chapter 3.  Help you understand what hardware is required to allow networks to work including: ◦ Repeaters ◦ Hub ◦ Switch ◦ Bridge ◦ Gateway (not needed.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
MC-Quiz: Chapter 9 Communications and Networks Discovering Computers 2010.
ICT Unit 4: Network and the effects of using them
Communication protocols 2. HTTP Hypertext Transfer Protocol, is the protocol of World Wide Web (www) Client web browser Web server Request files Respond.
NETWORK SECURITY. What do you see THE IMPORTANCE OF SECURITY THE ARE WEBSITES ON THE INTERNET COULD INFORM PEOPLE THE RANGE AND AVAILABLE UNSECURED SITES.
Ethernet, WiFi & Protocols
Unit Communication Hardware
Networks and Communication
Application layer tcp/ip
Chapter 4 Computer Networks – Part 2
How To Set Up A Wireless Network
GCSE ICT Revision Topic 2: Connectivity.
CompTIA IT Fundamentals Study Guide (FC0-U51)
Topic 5: Communication and the Internet
Protocols 2 Key Revision Points.
Protocol Application TCP/IP Layer Model
Presentation transcript:

Don’t Log in!

Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes for each unit, without getting hand ache!

Unit 2: Connectivity Ready?

Connectivity LAN – Benefits of local area networks, sharing the internet connection, sharing files, sharing peripherals. Routers – connecting from a home network requires a router. It connects all the computers to the modem by giving them internal IP address, so it ‘knows’ where to send the data. Powerline – A powerline network uses existing power wiring as a framework to carry data. Home Networks

Connectivity Securing a network – set up encryption, set up media access control (MAC) address filtering, hiding the router by stopping the router broadcasting its service set identifier (SSID), turning off the router and reducing transmitter power. Encryption – scrambles data so that only computers with the right key can read it. Most common types are WEP, WPA-PSK and WPA 2. MAC – You can specify which addresses can connect to your wireless network. Network Security

Connectivity Communications technologies in different devices – GSM – 4G, Bluetooth, Wi-Fi, Mini USB port, Firewire port, Ethernet port. Combining Technologies

Connectivity Bandwidth – The number of bits that can go through the network connection in 1 second. It is measured in bits per second (bps). Latency – Latency is the time in milliseconds between a bit leaving one device and arriving at the other. It is measured in milliseconds. For streaming videos from YouTube you need high bandwidth network connection. To get quick results from google you need low latency. Bandwidth and Latency

Connectivity Wi-Fi – Need to be in range of a wireless access point or hotspot, good range, speeds, widely available, can be hacked, cannot use if not in range. Mobile broadband – Allows devices to connect to the internet via the same network that 3G does. Mobile phones have the technology to pick up 3G signals built in, whereas other devices need a dongle. Greater coverage, more secure than wi-fi, have to pay can include roaming charges, downloads limited, lower bandwidth. Wi-Fi and Mobile Broadband

Connectivity Bluetooth – peer to peer network, allows devices to communicate automatically. Can connect eight devices, low power. Wi-Fi – The wi-fi Alliance has now introduced wi-fi direct, which allows devices to connect directly using wi-fi without the need for a wireless access point. Wi-Fi Direct allow users to set up peer-to-peer networks. Peer to peer networks

Connectivity VoIP – Voice Over Internet Protocol set the rules for transmitting audio messages. You can also use it to make video calls. SMTP – Simple Mail Transfer Protocol use when an is sent from the sender’s client e.g. Outlook POP or POP3 – Post Office Protocol, read the , download to computer, delete off server. IMAP – Internet Message Access Protocol, is read on the mail server, the is not deleted from the server. Communication Protocol

Connectivity HTTP – Hypertext Transfer Protocol is the protocol used of the world wide web. HTTPS – Hypertext Transfer Protocol is over SSL (Secure Sockets Layer), the data transferred is encrypted so it can not be read by anyone expect the recipient. Digital Certificates – If you double click the padlock it will show the websites digital certificate. They are normally issues by companies such as Norton, they certify the identity but can be faked. Communication Protocol

Connectivity Remote Access – You can prevent remote access to your computer through firewall. It s software that permits or blocks connections between your computer and other computers. Viruses can still get in! Strong password – numbers, upper and lower case letters, punctuation marks Physical security – Chains and locks, RFID (radio frequency identification), use lock feature on computer, biometrics, security keypads on doors, burglar alarm, CCTV, swipe cards. Security risks in a network

Let’s have a break and do an activity… Log on to your computer… Create at least one of every type of question with a mark scheme, create it as a power point and me it when you have completed it. It must be based on connectivity. List State Identify Give Name Describe Explain Discuss Finished? Go to the common area; student area; computing and ICT; teacher resources; mrs costa/Vincent.