Presentation is loading. Please wait.

Presentation is loading. Please wait.

Topologies, Protocols and Layers

Similar presentations


Presentation on theme: "Topologies, Protocols and Layers"— Presentation transcript:

1 Topologies, Protocols and Layers
Keywords Topology, Mesh Network, Star Network, Wi-Fi, Encryption, Ethernet Networks Topologies, Protocols and Layers

2 Mesh and Star Networks Objectives Task 1 Task 2
BEGINNER: Identify a Star and Mesh Topology ADVANCED: Compare Advantages and Disadvantages of Wi-Fi and Ethernet EXPERT: Understand and explain what encryption is and why it is required Task 1 Task 2 1. Draw a mesh network. 1. Draw a star network. 2. Label the diagram. 2. Label the diagram. 3. Write down the features of a mesh network. 3. Write down the features of a star network. Starter activity

3 Mesh Network Objectives BEGINNER: Identify a Star and Mesh Topology
ADVANCED: Compare Advantages and Disadvantages of Wi-Fi and Ethernet EXPERT: Understand and explain what encryption is and why it is required Starter activity

4 Star Network Objectives BEGINNER: Identify a Star and Mesh Topology
ADVANCED: Compare Advantages and Disadvantages of Wi-Fi and Ethernet EXPERT: Understand and explain what encryption is and why it is required Starter activity

5 Mesh and Star Networks A Mesh Network is ….
Objectives BEGINNER: Identify a Star and Mesh Topology ADVANCED: Compare Advantages and Disadvantages of Wi-Fi and Ethernet EXPERT: Understand and explain what encryption is and why it is required A Mesh Network is …. Where some or all of the workstations or other devices are connected directly to each of other. Most are usually connected to the node that they exchange the most data with.  A Star Network ….. In a star network, each device is connected by an individual cable directly to the server. Star networks are usually the layout of choice in schools and offices because they tend to be the most reliable of the topologies. Starter activity

6 Ethernet and Wifi Objectives TASK
BEGINNER: Identify a Star and Mesh Topology ADVANCED: Compare Advantages and Disadvantages of Wi-Fi and Ethernet EXPERT: Understand and explain what encryption is and why it is required Starter activity TASK Write a list of benefits for Ethernet and a list of Wi-Fi.

7 Wi-Fi (Wireless Frequency)
Objectives BEGINNER: Identify a Star and Mesh Topology ADVANCED: Compare Advantages and Disadvantages of Wi-Fi and Ethernet EXPERT: Understand and explain what encryption is and why it is required Radio waves are used to transmit data packets without the need for wires. This method is slower and more vulnerable to attack but it removes the need for cabling and networks. This means that it can be set up in remote locations such as in vehicles, in parks or on planes etc. Starter activity

8 Encryption Objectives BEGINNER: Identify a Star and Mesh Topology ADVANCED: Compare Advantages and Disadvantages of Wi-Fi and Ethernet EXPERT: Understand and explain what encryption is and why it is required Encryption is a method of scrambling data with a key code which makes no sense. On an open or public WiFi network anyone can join and sniff out packets of data from other users. Therefore encryption is used. If intercepted the data will have no meaning. In order to read the data the user is required to decrypt the data using the key. When you are using a secure site for example your bank, or purchasing on Amazon, encryption applied to keep your details safe. The encryption method used is called 'SSL' (Secure Socket Layer). A tiny padlock appears in your browser window, usally on the left hand side of the address bar and the website address starts with Starter activity

9 Example Twitter users a HTTPS when you log in, why?
Objectives BEGINNER: Identify a Star and Mesh Topology ADVANCED: Compare Advantages and Disadvantages of Wi-Fi and Ethernet EXPERT: Understand and explain what encryption is and why it is required Twitter users a HTTPS when you log in, why? What could happen if it was not encrypted? Starter activity Why does the data need to be encrypted? What could happen if it was not encrypted?


Download ppt "Topologies, Protocols and Layers"

Similar presentations


Ads by Google