Download presentation
Presentation is loading. Please wait.
Published byRussell Harmon Modified over 9 years ago
1
Unit 9 Network Fundamentals
2
Describe a network Explain the benefits of a network Identify risks in computing Describe the roles of clients & servers List & describe types of networks List & describe communications media & hardware Describe network security
3
2 or more connected devices Can transfer data
4
BenefitsRisks
5
Share information ◦ Chat rooms, blogs, IM, etc. Collaborate ◦ Work together on projects Share Hardware ◦ One printer for all to share on network Share Software ◦ Software installed on a server ◦ Licenses for users to access from server Email ◦ Free, no matter how far travels or how big
6
Equipment failure ◦ Bad equipment or loss of power ◦ May not be able to access server, printer, etc. Hackers ◦ People who break into systems ◦ Steal info or delete data ◦ Make viruses Loss of Autonomy ◦ What you do can be tracked & watched Vulnerable to Malicious Code ◦ Easy to pass viruses, works, etc. Setup costs & maintenance of network Email is not private ◦ Plus junk email is annoying
7
Theft of services Theft of Information Hatred & vengeance For the thrill of it
8
T or F. Hackers invade other people’s computers only for fun. T or F. Software sharing is one of the benefits of networking. When you are on a network, you should assume that your email is not _____________? ◦ Private T or F. It is easier for a virus to spread on a network.
9
Server manages & provides a service to client Network OS Username & password
10
No server Small office or house Easy to set up
11
Local Area Network Small geographic area ◦ Office, school, house WLAN ◦ Wireless ◦ Need Wi-Fi card
12
Wide Area Network Large geographic area ◦ Two or more LANs connected ◦ Big businesses with office around country or world ◦ Internet is biggest WAN Routers
13
Global network of connected, smaller networks World Wide Web & email are most popular
14
Web based for internal company use ◦ Handbooks, manuals, employment forms, work news, etc ◦ Only can access from within that company ◦ Through web browser
15
Similar to Intranet Outside users with user name & password can have access to internal info
16
How is the network at school different than your home one? ◦ How is it the same? Which type of network has an OS & requires a username/password for access? ◦ Client-server What are two popular Internet features? ◦ Email & Web At BK, you can access the Internet with your laptop & no wires. What type of network is this? ◦ WLAN
17
Dial-Up Modem (Int or Ext) ◦ Modulate-demodulate Converts analog to digital & reverse ◦ Data over phone lines Dialed into a phone number ◦ SLOWWWWW Old- 300 bits per second (bps) or baud rate Now- 56k or kilobits per second
18
Coaxial (Coax) cable High speed, always on ◦ Broadband ◦ 20Mbps (Megabits per second) Cable Modem
19
Digital Subscriber Line High speed, always on ◦ Broadband ◦ Through phone lines ◦ 3Mbps Can use phone & Internet at same time ◦ Filters on phones
20
ISDN (Old) ◦ Faster than dial-up, over phone line T1 ◦ High speed for business ◦ Fiber optics telephone line FiOS ◦ Similar to T1 ◦ Faster speeds ◦ Limited areas
21
Router ◦ Connects computers ◦ Shares one Internet connection ◦ May allows wireless access ◦ Firewall Wireless Adapters or NIC
23
T or F. A modem converts analog to digital signals. T or F. Hackers invade other people’s computers only for fun. A _______ is confined to a limited geographical area. A _______ is made up of several local area networks. A _______ is a simple device that connects multiple computers together.
24
ISP ◦ Internet Service Provider ◦ Pay them (Comcast, Verizon)
25
Dial-Up ◦ Slow ◦ Telephone Lines Broadband ◦ High Speed ◦ Always On ◦ Cable, DSL, Satellite Cable, Phone, Dish/Air, Fiber Optics Wi-Fi ◦ Wireless access ◦ Public (Starbucks)
27
Control access to computer ◦ User name, passwords ◦ If none, unauthorized people can gain access & take/read valuable info OR change it so no one can use it Passwords ◦ Change often ◦ Use upper & lowercase letters, numbers, punctuation Not easy stuff ◦ Don’t write them down “cheat sheet” Broken mostly by shared ones or cheat sheets, not guessing
28
Firewall ◦ Protects against unauthorized access to network from outside Antivirus Software ◦ Always be running, updating Wi-Fi Protection ◦ Use the security settings
29
Be careful who you hire ◦ People who don’t follow rules Back up data off-site Biometric security ◦ Fingerprint reader ◦ Voice pattern ◦ Retina scan
30
What device allows many PC’s to share a single, high-speed Internet connection? ◦ Router What are the companies called that charge you for Internet access? ◦ ISP What is the slowest Internet access method? ◦ Dial-Up
31
Unit 9 Network Fundamentals
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.