 An electrical device that sends or receives radio or television signals through electromagnetic waves.

Slides:



Advertisements
Similar presentations
Network Security.
Advertisements

Networks & Components Discuss the components required for successful communications Explain the purpose of communications software Identify various sending.
Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013 Connecting.
(4.4) Internet Protocols Layered approach to Internet Software 1.
BTT 101 / 2O1 Lesson 10 Dundas Valley Secondary Mr. Young.
IS 247 Introduction to Web Application Development Tim Wu.
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
1-1 Introduction to Computer Networks and Data Communications.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Wi-Fi Structures.
1 Wireless LANs. 2 Introduction Types of Communication Networks. LAN’s Configurations. Wireless Technology. –Definition. –Applications. –Example. Communications.
1 Networking A computer network is a collection of computing devices that are connected in various ways in order to communicate and share resources. The.
PROTOCOLSSTANDARDSEQUIPMENTBLUETOOTH CELL PHONE DATA NETWORKS ADVANTAGES/ DISADVANTAGES GENERAL INFORMATION Main Menu.
Securing a Wireless Network
1Lecturer: Dalia Mirghani Saadabi. 2 A set of computers connected together so that they can communicate is called a computer network. This involves installing.
Internet Standard Grade Computing. Internet a wide area network spanning the globe. consists of many smaller networks linked together. Service a way of.
CHAPTER 5 : COMMUNICATIONS AND THE INTERNET (PART 1) INFORMATION TECHNOLOGY AND ITS APPLICATIONS SSK3000 Faculty of Computer Science and Information Technology,
CHAPTER OVERVIEW SECTION 7.1 – Connectivity: The Business Value of a Networked World Overview of a Connected World Benefits of a Connected World Challenges.
CMPTR Chapter 5.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Networks A network is a collection of computers and devices connected together via communications devices and transmission media Advantages of a network.
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Wi-Fi Technology By Marc Bailey. What is Wi-Fi? Wi-Fi or Wireless Fidelity is a wireless technolgy owned by the Wi-Fi Alliance (formed in 1999) Goal:
Wireless Networks Tamus, Zoltán Ádám
Unit 1—Computer Basics Lesson 7 Networks.
Wireless or wired connection of the technician’s smartphone to Cable Ties network.
NETWORKS.
Introduction to Internet terms. Topics to Study What is Internet HTTP URL SMS MMS Wi-Fi Video Conferencing Social Webisites.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Living Online Module Lesson 23 — Networks and Telecommunication
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Information Flow Across the Internet. What is the Internet? A large group of computers that link together to form the Worldwide Area Network (WAN)
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
WIFI. What is wifi ? Wi-Fi is the name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network.
Computers Are Your Future Eleventh Edition
Introduction to Information Systems Lecture 06 Telecommunications and Networks Business Value of Networks Jaeki Song.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
By Kim Young Jun IGCSE1.  Computer network  Common types of network  Ring, bus, star and tree  Local are networks  Wide are networks  Wireless LANs.
Connectivity  The ability of a computer to communicate with others Sending Device Communications Device Communications Channel Communications Device Receiving.
WIRELESS NETWORKING Ramiah Qasem, Jahmia Algahmie, Andrew Speice.
Living Online Module Lesson 23 — Networks and Telecommunication Computer Literacy BASICS.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
THE INTERNET. TABLE OF CONTENT CONNECTING TO THE INTERNET ELECTRONIC MAIL WORLD WIDE WEB INTERNET SERVICES.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
ISDS 4120 Project 1 DWAYNE CARRAL JR 3/27/15. There are seven layers which make up the OSI (Open Systems Interconnection Model) which is the model for.
Networks. Local area network (LAN( Wide-area network (WAN( Networks Topology.
Chapter 7 Part 2 Networks. Why would I ever consider a wired network connection over a wireless? – Wireless signals are more susceptible to interference.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
INTRODUCTION TO THE INTERNET Internet Protocol Cameras Training: Session 1.
Lesson 7 Networks Unit 1—Computer Basics. Computer Concepts BASICS - 2 Objectives Describe the benefits and disadvantages of networks. List and describe.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 9 Networks and Communications.
Chapter 1-4 Home Networking. Introduction Setting up a home network is probably one of the first networks that the student sets up. This is an exciting.
Network media, protocols and networking standards, networking hardware.
Also known as hardware/physi cal address Customer Computer (Client) Internet Service Provider (ISP) MAC Address Each Computer has: Given by NIC card.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
ICT Unit 4: Network and the effects of using them
Network System Security - Task 2. Russell Johnston.
By: Hunza, Omar and Anum Chapter 4 pg(76-79).
Chapter Objectives In this chapter, you will learn:
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Chapter 4 Computer Networks – Part 2
Networks and Connecting to the Internet
Unit 8 Network Security.
Electronic Payment Security Technologies
Presentation transcript:

 An electrical device that sends or receives radio or television signals through electromagnetic waves.

 An open wireless protocol for exchanging data over short distances from fixed and mobile devices

 A portable telephone that connects with the telephone network over radio wave transmission. Mobile phones connect to transmission towers which supply specific small areas and connect signals from this area to the transmission tower in the area containing the receiving telephone

 Dynamic Host Configuration Protocol controls how a client joins a network. In a model situation, the client sends a request for the appropriate networking information to the server of the network, and is sent back these details along with an IP address.

 a public area where customers can access the Internet using wireless local area networks (WLAN). Hotspots exist in public areas where Wi-Fi connections are available. Hotspots are becoming more popular in places like cafes and airports.

 (Hypertext Transfer Protocol over Secure Socket Layer, or HTTP over SSL): a Web protocol built into browsers that encrypts and decrypts user page requests as well as the pages that are returned by the Web server. This is a protocol for the server software that provides "secure" transactions on the World Wide Web.

 An ISP, or Internet Service Provider, is a company or organization that has the equipment and telecommunication line access to provide connectivity to the Internet for customers

 An Internet Protocol (IP) address is a numerical identification and logical address that is assigned to devices participating in a computer network. An IP address consists of four parts, and is a completely unique identification number throughout the Internet.

 In a network, a MAC address is a unique serial number burned into hardware adapters, giving the adapter a unique identification. This serial number is a 12 digit hexadecimal number.

 A modem is a device that encodes digital computer signals into analog/analogue telephone signals and vice versa and allows computers to communicate over a phone line

 A radio channel is the passing of digital signals as electromagnetic waves sent over long distances.

 A radio channel is the process where signals are passed on through electromagnetic waves that are invisible.

 Most software, such as Hotmail, comes with filters that help to minimise spam. Users can set these to different levels, the highest level which would refuse all s unless they are sent by known users. Whilst this may be effective, it can obviously block important s from new contacts. At a lower level of protection, spam filters spot whether the is likely to be spam but this does not ensure that no spam is let through. Rough. The biggest danger is when spam s arrive with a virus attachment.

 SSID is an acronym for Service Set Identifier. The SSID is a sequence of up to 32 letters or numbers that is the ID, or name, of a wireless local area network

 A hardware device which connects devices on separate ports to each other in order to allow for the communication of data.

 A USB hub is a device that allows many USB devices to be connected to a single USB port on a host computer or another hub.

 Anti-virus software (alternate spelling anti-virus) mainly prevent and remove computer viruses, including worms and Trojan horses.

 Web Conferencing is used to conduct live meeting or presentations over the internet. This is conducted by utilizing a direct link between one or more computers and allowing video, audio, and collaboration between users.

 A Virtual Learning Environment, or VLE, is software designed to enhance a students ability to learn online, by providing tools similar to those which are available in the classroom and facilitating easy distance learning.

 Wi-Fi is a trademark of the Wi-Fi Alliance for certified products based on the IEEE standards. This certification warrants interoperability between different wireless devices.

 A wireless technology similar to that of Wi-Fi, but with a linger range. As it is not Wi-Fi, it cannot be received by standard Wi-Fi receivers, needing either a converter to a Wi-Fi signal or a Wi-Max receiver

 Wired Equivalent Privacy/ Wi-Fi Protected Access (2) are algorithms that are used to secure wireless networks using encryption of data and requiring user authentication. WEP has become deprecated with the developments of WPA and WPA2