Unit Network Topologies, protocols and layers Lesson 1

Slides:



Advertisements
Similar presentations
A Level Business Investment Appraisal Lesson Elements.
Advertisements

Stereoisomerism in Alkenes. What you need to know Explanation of the terms: stereoisomers (compounds with the same structural formula but with a different.
Women in Literature An introductory lesson. Equality When we ask the question, Are women equal to men? in what ways are we using the word "equal"? Discuss.
A Level Chemistry A Topic Exploration Pack
A Level Physics A Delivery Guide Modelling decay of charge Key Concepts.
Activity 1 5 minutes to discuss and feedback on the following:
© OCR 2016 Motion graphs. © OCR 2016 MOTION GRAPHS LESSON ELEMENT.
© OCR 2016 H070 Topic Title H470 Topic Title Urban Futures Learner Resource 4 – Push and Pull Factors.
© OCR 2016 H070 Topic Title H470 Topic Title Rotations.
The purpose of one Christian Aid Agency
Marriage and the wedding ceremony
Learner Activity 2: Boltzmann Distribution Curves Part of the ‘Rates of reaction and the Arrhenius equation’ Topic Exploration Pack.
The Boltzmann Distribution
A Level Business Investment Appraisal Lesson Elements.
LAN, WAN, and Network Topologies
Vectors H070 Topic Title H470 Topic Title.
Burglary picture game.
Go to youtube and search “Code.org internet videos”
China and its rulers activities
H070 Topic Title H470 Topic Title Delivery Guide (Learner Resource)
Balancing Equations Lesson Element.
Unit 2.5 Translators and Facilities of Languages – Lesson 1
Delivery Guide Distinctive Landscapes © OCR 2017
Unit 2.5 Translators and Facilities of Languages – Lesson 2
H070 Topic Title H470 Topic Title Urban Futures
Glacier National Park, MT
Topologies, Protocols and Layers
A Level Physics Delivery Guide.
The Maxwell–Boltzmann Distribution
Interpreting the past delivery guide Learner resource 3
Watch this video clip taken from Futurama
Unit 2.3 Robust Programs Lesson 2 - Testing Programs
H070 Topic Title H470 Topic Title Urban Futures
Unit 2.3 Robust Programs Lesson 1 - Defensive Design Consideration
Environmental Challenges
Unit 1.4 Wired and Wireless Networks Lesson 2
Unit Network Topologies, protocols and layers Lesson 3
Landscapes of the UK Learner Resource 3 Comparing characteristics.
Unit 1.4 Wired and Wireless Networks Lesson 1
Unit 1.6 Systems security Lesson 3
Unit Network Topologies, protocols and layers Lesson 2
Theft picture game.
A Level Business Lesson Elements.
Electromagnetic spectrum
Combination of Transformations
Electromagnetic spectrum
Unit 1.6 Systems security Lesson 4
Unit 1.6 Systems security Lesson 2
An introductory lesson
Roots and Shoots Lesson Element.
Unit 1.4 Wired and Wireless Networks Lesson 3
Unit 1.3 Storage Lesson 2: Storing Data
The stack is eroded and weathered creating a stump
What makes these UK landscapes distinctive?
Unit 1.1 Systems Architecture Lesson 1
© OCR NETWORK TOPOLOGIES, PROTOCOLS AND LAYERS 2.
Learner Activity 2: Boltzmann Distribution Curves Part of the ‘Rates of reaction and the Arrhenius equation’ Topic Exploration Pack.
TCP/IP routing simulation
H070 Topic Title H470 Topic Title Urban Futures
Unit 1.3 Storage Lesson 1: Storage Devices
Unit 1.1 System Architecture Lesson 2
Unit 1.3 Storage Lesson 1: Storage Devices
A Level Business Investment Appraisal Lesson Elements.
Who… What… Why… When… Where… How… Could… Should….
Networks Topologies.
Who… What… Why… When… Where… How… Could… Should….
What evidence is there to suggest climate change is a natural process?
Describing Graphs Describe the overall trend shown on the graph
Unit 1.6 Systems security Lesson 1
Year 9 Computer Science Digital Portfolio
Presentation transcript:

Unit 1.5 - Network Topologies, protocols and layers Lesson 1

Big picture Most computers and devices are connected together via networks. This opens up new opportunities and advantages. What are the advantages?

Learning Objectives Students will be able to identify a Star and Mesh Topology Students will be able to compare Advantages and Disadvantages of Wi-Fi and Ethernet Understand and explain what encryption is and why it is required

What is a Network? A computer network is a number of computers linked together to allow them to share resources. Networked computers can share hardware, software and data. BBC Bitesize

Engagement Activity Networks are all around you, in school, at home in businesses and hospitals. Think about what these networks look like Draw a diagram to represent one of these networks. Include the parts, devices and wires Be ready to explain your diagram

Key Words Topology Mesh Network Star Network WiFi Encryption Ethernet

Activity 1 You will be given some string and cups. Create a Mesh Network Create a Star Network Think about and discuss the features of each.

Activity 1 - Answer

Activity 1 - Answer

Content A Mesh Network is …. A Star Network ….. Where some or all of the workstations or other devices are connected directly to each of other. Most are usually connected to the node that they exchange the most data with.  A Star Network ….. In a star network, each device is connected by an individual cable directly to the server. Star networks are usually the layout of choice in schools and offices because they tend to be the most reliable of the topologies.

Activity 2 You will be given a selection of cards that show the advantages and disadvantage's of Wired and Wireless networks (Ethernet and WiFi) Sort the into groups Compare you answers with other students.

Activity 2 - Answer

WiFi WiFi is Wireless Frequency - radio waves are used to transmit data packets without the need for wires. This method is slower and more vulnerable to attack but it removes the need for cabling and networks This means that it can be set up in remote locations such as in vehicles, in parks or on planes etc.

WiFi Frequency and Channels https://www.youtube.com/watch?v=3YHovkP1JC8

Encryption Encryption is a method of scrambling data with a key code which makes no sense. On an open or public WiFi network anyone can join and sniff out packets of data from other users. Therefore encryption is used. If intercepted the data will have no meaning In order to read the data the user is required to decrypt the data using the key.

Content When you are using a secure site for example your bank, or purchasing on Amazon, encryption applied to keep your details safe: The encryption method used is called 'SSL' (Secure Socket Layer). A tiny padlock appears in your browser window, usally on the left hand side of the address bar and the website address starts with HTTPS://

Twitter example

Consider Twitter Twitter users a HTTPS when you log in, why? Why does the data need to be encrypted? What could happen if it was not encrypted?

Encryption video https://www.youtube.com/watch?v=w0QbnxKRD0w

Encryption task http://www.cryptoclub.org/

Encryption task http://www.cryptoclub.org/games/rogue_computer.php

Key Words Recap Topology Mesh Network Star Network WiFi Encryption Ethernet

Plenary Answer some questions from the exam papers on the topics Create a short animation or film on Network security. Stretch yourself! Code an encryption program using a programming language of your choice.

OCR Resources: the small print OCR’s resources are provided to support the teaching of OCR specifications, but in no way constitute an endorsed teaching method that is required by the Board, and the decision to use them lies with the individual teacher. Whilst every effort is made to ensure the accuracy of the content, OCR cannot be held responsible for any errors or omissions within these resources. © OCR 2016 - This resource may be freely copied and distributed, as long as the OCR logo and this message remain intact and OCR is acknowledged as the originator of this work. OCR acknowledges the use of the following content: n/a Please get in touch if you want to discuss the accessibility of resources we offer to support delivery of our qualifications: resources.feedback@ocr.org.uk