Presentation is loading. Please wait.

Presentation is loading. Please wait.

Unit 8 Network Fundamentals Describe a network Explain the benefits of a network Identify risks in computing Describe the roles of clients & servers.

Similar presentations


Presentation on theme: "Unit 8 Network Fundamentals Describe a network Explain the benefits of a network Identify risks in computing Describe the roles of clients & servers."— Presentation transcript:

1

2 Unit 8 Network Fundamentals

3 Describe a network Explain the benefits of a network Identify risks in computing Describe the roles of clients & servers List & describe types of networks List & describe communications media & hardware Describe network security

4  2 or more connected devices  Can transfer data

5  Local Area Network ◦ In a small area ◦ Office, school, house  WLAN ◦ Wireless ◦ Need Wi-Fi card

6  Wide Area Network  Large geographic area ◦ Two or more LANs connected by routers ◦ Big businesses with office around country or world  Internet is biggest WAN  Connected by fiber, satellites, telephone

7  Server manages & provides a service to client  Network OS  Username & password

8  No server ◦ All PCs equal  Small office or house  Easy to set up

9  Global network of connected, smaller networks  You connect to it through an ISP  World Wide Web & email are most popular

10  Web based for internal company use ◦ Handbooks, manuals, employment forms, work news, etc ◦ Only can access from within that company ◦ Through web browser

11  Similar to Intranet  Outside users with user name & password can have access to internal info

12  Identify the type of network handout  Teknimedia: ◦ C1.1-5 ◦ C1.43-44 ◦ C1.49

13  Which type of network…  Has no server & all PCs are equal? ◦ Peer to Peer  Is a bunch of connected LANs over a large area? ◦ WAN  Can only be viewed within a company network? ◦ Intranet

14

15  Modulate-Demodulate  Digital to analog/analog to digital  Allows data to be transmitted over a line and changed from one signal to another

16  Dial-Up Modem ◦ Internal or External ◦ Data over phone lines  Dialed into a phone number ◦ SLOWWWWW  Old- 300 bits per second (bps) or baud rate  Now- 56k or kilobits per second

17  Data over Coaxial (Coax) cable  High speed, always on ◦ Broadband ◦ 20Mbps (Megabits per second) & up

18

19  Digital Subscriber Line  High speed, always on ◦ Broadband ◦ Through phone lines ◦ 1.5-3Mbps  Can use phone & Internet at same time ◦ Filters on phones

20

21  Router/Multipurpose Device ◦ Connects computers ◦ Shares one Internet connection ◦ May allows wireless access ◦ Firewall  Wireless Adapters or NIC

22

23  Network devices need an IP Address & MAC Address to communicate (TCP/IP) ◦ IP: 192.168.1.120 (assigned logically) ◦ MAC: 0A-B5-74-C3-1E-FF (physically on NIC)  DNS ◦ Translates names to IP addresses

24  Which Internet connection sends high speed broadband over analog phone lines? ◦ DSL  If a coax cable connects to your modem, which Internet service do you have? ◦ Cable modem or FiOS  Every computer needs an ___ & ____ to communicate on a network. ◦ IP address & MAC address  The 4 LAN ports on the back of a home router is really what device? ◦ Switch

25 BenefitsRisks

26  Enhanced Communication ◦ Email, text, social media, etc.  Share information ◦ Chat rooms, blogs, IM, wecasts, etc.  Collaborate ◦ Work together on projects  Share Hardware ◦ One printer for all to share on network  Share Software ◦ Software installed on a server ◦ Licenses for users to access from server  E-Commerce  Telecommute  Entertainment

27  Privacy ◦ Vulnerable to unauth. Access, hackers  Equipment failure ◦ Bad equipment or loss of power ◦ May not be able to access server, printer, etc.  Hackers ◦ People who break into systems ◦ Steal info or delete data ◦ Make viruses  Loss of Autonomy ◦ What you do can be tracked & watched  Vulnerable to Malicious Code ◦ Easy to pass viruses, works, etc.  Setup costs & maintenance of network  Email is not private ◦ Plus junk email is annoying

28  Theft of services  Theft of Information  Hatred & vengeance  For the thrill of it

29  T or F. Hackers invade other people’s computers only for fun.  T or F. Software sharing is one of the benefits of networking.  When you are on a network, you should assume that your email is not _____________? ◦ Private  T or F. It is easier for a virus to spread on a network.

30  How is the network at school different than your home one? ◦ How is it the same?  Which type of network has an OS & requires a username/password for access? ◦ Client-server  What are two popular Internet features? ◦ Email & Web  At BK, you can access the Internet with your laptop & no wires. What type of network is this? ◦ WLAN

31  T or F. A modem converts analog to digital signals.  T or F. Hackers invade other people’s computers only for fun.  A _______ is confined to a limited geographical area.  A _______ is made up of several local area networks.  A _______ is a simple device that connects multiple computers together.

32  ISP ◦ Internet Service Provider ◦ Pay them (Comcast, Verizon)

33  Dial-Up ◦ Slow ◦ Telephone Lines  Broadband ◦ High Speed ◦ Always On ◦ Cable, DSL, Satellite  Cable, Phone, Dish/Air, Fiber Optics  Wi-Fi ◦ Wireless access ◦ Public (Starbucks)

34

35  ISDN (Old) ◦ Faster than dial-up, over phone line  T1 ◦ High speed for business (1.5Mbps) ◦ Dedicated fiber optic line  FiOS ◦ Faster speed over fiber ◦ Comparable to Cable modem ◦ Limited areas

36  Control access to computer ◦ User name, passwords ◦ If none, unauthorized people can gain access & take/read valuable info OR change it so no one can use it  Passwords ◦ Change often ◦ Use upper & lowercase letters, numbers, punctuation  Not easy stuff ◦ Don’t write them down “cheat sheet”  Broken mostly by shared ones or cheat sheets, not guessing

37  Firewall ◦ Protects against unauthorized access to network from outside  Antivirus Software ◦ Always be running, updating  Wi-Fi Protection ◦ Use the security settings

38  Be careful who you hire ◦ People who don’t follow rules  Back up data off-site  Biometric security ◦ Fingerprint reader ◦ Voice pattern ◦ Retina scan

39  What device allows many PC’s to share a single, high-speed Internet connection? ◦ Router  What are the companies called that charge you for Internet access? ◦ ISP  What is the slowest Internet access method? ◦ Dial-Up

40 Unit 8 Network Fundamentals


Download ppt "Unit 8 Network Fundamentals Describe a network Explain the benefits of a network Identify risks in computing Describe the roles of clients & servers."

Similar presentations


Ads by Google