Presentation is loading. Please wait.

Presentation is loading. Please wait.

Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer.

Similar presentations


Presentation on theme: "Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer."— Presentation transcript:

1 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer or buy a new one?How can I determine whether I should upgrade my existing computer or buy a new one? What does the CPU do and how can I evaluate its performance?What does the CPU do and how can I evaluate its performance? How does memory work and how can I evaluate how much memory I need?How does memory work and how can I evaluate how much memory I need? What are the computer’s main storage devices and how can I evaluate whether they match my needs?What are the computer’s main storage devices and how can I evaluate whether they match my needs? How can I determine whether I should upgrade my existing computer or buy a new one?How can I determine whether I should upgrade my existing computer or buy a new one? What does the CPU do and how can I evaluate its performance?What does the CPU do and how can I evaluate its performance? How does memory work and how can I evaluate how much memory I need?How does memory work and how can I evaluate how much memory I need? What are the computer’s main storage devices and how can I evaluate whether they match my needs?What are the computer’s main storage devices and how can I evaluate whether they match my needs? NEXT SLIDE

2 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.2 Chapter 6 Summary Questions What components affect the output of video and how can I evaluate whether they are meeting my needs?What components affect the output of video and how can I evaluate whether they are meeting my needs? What components affect the quality of sound and how can I evaluate whether they are meeting my needs?What components affect the quality of sound and how can I evaluate whether they are meeting my needs? What components affect the output of video and how can I evaluate whether they are meeting my needs?What components affect the output of video and how can I evaluate whether they are meeting my needs? What components affect the quality of sound and how can I evaluate whether they are meeting my needs?What components affect the quality of sound and how can I evaluate whether they are meeting my needs? NEXT SLIDE

3 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.3 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses NEXT SLIDE

4 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.4 TopicsTopics Networking fundamentalsNetworking fundamentals Network architectureNetwork architecture Network componentsNetwork components Peer-to-peer networksPeer-to-peer networks Computer threatsComputer threats Computer safeguardsComputer safeguards Computer virusesComputer viruses Networking fundamentalsNetworking fundamentals Network architectureNetwork architecture Network componentsNetwork components Peer-to-peer networksPeer-to-peer networks Computer threatsComputer threats Computer safeguardsComputer safeguards Computer virusesComputer viruses NEXT SLIDE NEXT SLIDE

5 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.5 Networking Fundamentals Computer network:Computer network: –Two or more computers connected together –Nodes Benefits of a network:Benefits of a network: –Sharing resources –Transferring files –Sharing internet Computer network:Computer network: –Two or more computers connected together –Nodes Benefits of a network:Benefits of a network: –Sharing resources –Transferring files –Sharing internet NEXT SLIDE

6 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.6 Network Architecture Network designs:Network designs: –Locally controlled: Peer-to-peer (P2P) Peer-to-peer (P2P) –Centrally controlled: Client/server Client/server Network designs:Network designs: –Locally controlled: Peer-to-peer (P2P) Peer-to-peer (P2P) –Centrally controlled: Client/server Client/server Peer-to-peer Client/ server NEXT SLIDE

7 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.7 Peer-to-Peer Networks Nodes communicate with each other:Nodes communicate with each other: –Peers Share peripheral devices:Share peripheral devices: –Printers –Scanners Home and small office networksHome and small office networks Nodes communicate with each other:Nodes communicate with each other: –Peers Share peripheral devices:Share peripheral devices: –Printers –Scanners Home and small office networksHome and small office networks NEXT SLIDE

8 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.8 Client/Server Networks Client computers:Client computers: –Users Server computers:Server computers: –Provide resources to clients –Central control unit InternetInternet Client computers:Client computers: –Users Server computers:Server computers: –Provide resources to clients –Central control unit InternetInternet NEXT SLIDE

9 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.9 LANs and WANs Local area network (LAN):Local area network (LAN): –Nodes are within a small geographic region: Homes Homes Schools Schools Small businesses Small businesses Wide area network (WAN):Wide area network (WAN): –LANs connected over long distances: A few miles to thousands of miles A few miles to thousands of miles Use telecommunications lines Use telecommunications lines Local area network (LAN):Local area network (LAN): –Nodes are within a small geographic region: Homes Homes Schools Schools Small businesses Small businesses Wide area network (WAN):Wide area network (WAN): –LANs connected over long distances: A few miles to thousands of miles A few miles to thousands of miles Use telecommunications lines Use telecommunications lines NEXT SLIDE

10 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.10 Network Components Transmission mediaTransmission media Network adaptersNetwork adapters Navigation devicesNavigation devices Network softwareNetwork software Transmission mediaTransmission media Network adaptersNetwork adapters Navigation devicesNavigation devices Network softwareNetwork software NEXT SLIDE

11 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.11 Transmission Media Provides communications channel between nodesProvides communications channel between nodes Forms of media:Forms of media: –Telephone wire: Twisted pair Twisted pair –Coaxial cable –Fiber-optic cable –Radio waves: Wireless Wireless Bandwidth:Bandwidth: –Data transfer rate, throughput Provides communications channel between nodesProvides communications channel between nodes Forms of media:Forms of media: –Telephone wire: Twisted pair Twisted pair –Coaxial cable –Fiber-optic cable –Radio waves: Wireless Wireless Bandwidth:Bandwidth: –Data transfer rate, throughput NEXT SLIDE

12 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.12 Network Adapters Devices connected to or installed in nodes:Devices connected to or installed in nodes: –Network interface cards (NIC) –External network adapter Enable communication between nodesEnable communication between nodes Devices connected to or installed in nodes:Devices connected to or installed in nodes: –Network interface cards (NIC) –External network adapter Enable communication between nodesEnable communication between nodes NIC External adapter NEXT SLIDE

13 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.13 Network Navigation Devices Devices that help make data flow possibleDevices that help make data flow possible –Packets Routers:Routers: –Route data between networks Hubs:Hubs: –Receive data and retransmit it to nodes on the network Devices that help make data flow possibleDevices that help make data flow possible –Packets Routers:Routers: –Route data between networks Hubs:Hubs: –Receive data and retransmit it to nodes on the network Hub Router NEXT SLIDE

14 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.14 Networking Software Software needed:Software needed: –Peer-to-peer: Operating systems that support networking Operating systems that support networking Windows Windows Mac OS Mac OS –Client/server: Network operating system (NOS) software Network operating system (NOS) software Windows XP Professional Windows XP Professional Windows Server 2003 Windows Server 2003 Novell Netware Novell Netware Software needed:Software needed: –Peer-to-peer: Operating systems that support networking Operating systems that support networking Windows Windows Mac OS Mac OS –Client/server: Network operating system (NOS) software Network operating system (NOS) software Windows XP Professional Windows XP Professional Windows Server 2003 Windows Server 2003 Novell Netware Novell Netware

15 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.15 Types of Peer-to-Peer Networks Power linePower line Phone linePhone line EthernetEthernet WirelessWireless Power linePower line Phone linePhone line EthernetEthernet WirelessWireless

16 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.16 Power Line Networks Computers are connected to a house’s electrical wiring to create a networkComputers are connected to a house’s electrical wiring to create a network Power line network adapter is used to connect nodes to electrical outletsPower line network adapter is used to connect nodes to electrical outlets Computers are connected to a house’s electrical wiring to create a networkComputers are connected to a house’s electrical wiring to create a network Power line network adapter is used to connect nodes to electrical outletsPower line network adapter is used to connect nodes to electrical outlets NEXT SLIDE

17 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.17 Phone Line Networks Computers are connected to a house’s telephone wiring to create a networkComputers are connected to a house’s telephone wiring to create a network Home phone line network adapter is used to connect nodes to phone jacksHome phone line network adapter is used to connect nodes to phone jacks Computers are connected to a house’s telephone wiring to create a networkComputers are connected to a house’s telephone wiring to create a network Home phone line network adapter is used to connect nodes to phone jacksHome phone line network adapter is used to connect nodes to phone jacks NEXT SLIDE

18 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.18 Ethernet Networks Computers are connected to each other using unshielded twisted pair cable (UTP)Computers are connected to each other using unshielded twisted pair cable (UTP) –Cat 5 (100Mbps), Cat 5E(200Mbps), Cat 6(1Gbps) Ethernet network adapters are used to connect nodesEthernet network adapters are used to connect nodes –NIC –PC card –USB adapter Computers are connected to each other using unshielded twisted pair cable (UTP)Computers are connected to each other using unshielded twisted pair cable (UTP) –Cat 5 (100Mbps), Cat 5E(200Mbps), Cat 6(1Gbps) Ethernet network adapters are used to connect nodesEthernet network adapters are used to connect nodes –NIC –PC card –USB adapter NEXT SLIDE RJ-45 connector PC card NIC card USB adapter

19 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.19 Ethernet Hubs Keep track of data packetsKeep track of data packets Amplify and retransmit signalsAmplify and retransmit signals Keep the network running efficientlyKeep the network running efficiently Keep track of data packetsKeep track of data packets Amplify and retransmit signalsAmplify and retransmit signals Keep the network running efficientlyKeep the network running efficiently NEXT SLIDE

20 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.20 Ethernet Routers Route packets of data between networksRoute packets of data between networks Router needed to send data between the network and the InternetRouter needed to send data between the network and the Internet Route packets of data between networksRoute packets of data between networks Router needed to send data between the network and the InternetRouter needed to send data between the network and the Internet NEXT SLIDE

21 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.21 Wireless Networks Use radio waves to connect nodesUse radio waves to connect nodes 802.11 standard (Wi-Fi: Wireless Fidelity)802.11 standard (Wi-Fi: Wireless Fidelity) –802.11b (11Mbps), 802.11g(54Mbps) Basically an Ethernet network that uses radio waves instead of wiresBasically an Ethernet network that uses radio waves instead of wires Each node requires a wireless network adapter:Each node requires a wireless network adapter: –Transceiver Use radio waves to connect nodesUse radio waves to connect nodes 802.11 standard (Wi-Fi: Wireless Fidelity)802.11 standard (Wi-Fi: Wireless Fidelity) –802.11b (11Mbps), 802.11g(54Mbps) Basically an Ethernet network that uses radio waves instead of wiresBasically an Ethernet network that uses radio waves instead of wires Each node requires a wireless network adapter:Each node requires a wireless network adapter: –Transceiver NEXT SLIDE

22 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.22 LimitationLimitation Maximum range: 250 feetMaximum range: 250 feet Interference with other wireless devicesInterference with other wireless devices Obstacles between wireless nodesObstacles between wireless nodes –Wall –Large metal objects Wireless DSL/cable routerWireless DSL/cable router Maximum range: 250 feetMaximum range: 250 feet Interference with other wireless devicesInterference with other wireless devices Obstacles between wireless nodesObstacles between wireless nodes –Wall –Large metal objects Wireless DSL/cable routerWireless DSL/cable router

23 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.23 Choosing a Peer-to-Peer Network Things to consider:Things to consider: –Existing wiring –Wireless or wired –Speed of the network –Cost of the network Things to consider:Things to consider: –Existing wiring –Wireless or wired –Speed of the network –Cost of the network NEXT SLIDE

24 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.24 ComparisonComparison

25 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.25 Configuring Software for a Home Network Windows operating system:Windows operating system: –Windows XP: Network setup wizard Network setup wizard –Windows ME: Network setup wizard Network setup wizard –Windows 98: Configure manually Configure manually Windows operating system:Windows operating system: –Windows XP: Network setup wizard Network setup wizard –Windows ME: Network setup wizard Network setup wizard –Windows 98: Configure manually Configure manually NEXT SLIDE

26 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.26 Computer Threats Cyber-crimeCyber-crime Hackers:Hackers: –Who they are –What they do –How they gain access Cyber-crimeCyber-crime Hackers:Hackers: –Who they are –What they do –How they gain access NEXT SLIDE

27 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.27 Cyber-crimes and Cyber-criminals Cyber-crimes are criminal acts conducted through the use of a computer:Cyber-crimes are criminal acts conducted through the use of a computer: –Fraud –Identity theft Cyber-criminals are individuals who use a computer to commit a crimeCyber-criminals are individuals who use a computer to commit a crime Cyber-crimes are criminal acts conducted through the use of a computer:Cyber-crimes are criminal acts conducted through the use of a computer: –Fraud –Identity theft Cyber-criminals are individuals who use a computer to commit a crimeCyber-criminals are individuals who use a computer to commit a crime NEXT SLIDE

28 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.28 HackersHackers Anyone who unlawfully accesses a computer systemAnyone who unlawfully accesses a computer system Types of hackers:Types of hackers: –Cracker –White-hat –Black-hat –Script kiddies Anyone who unlawfully accesses a computer systemAnyone who unlawfully accesses a computer system Types of hackers:Types of hackers: –Cracker –White-hat –Black-hat –Script kiddies NEXT SLIDE

29 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.29 What Hackers Do Steal information from computers:Steal information from computers: –Credit card numbers –Bank account numbers Internet packet sniffingInternet packet sniffing Commit identity theftCommit identity theft Create widespread computer attacks:Create widespread computer attacks: –Backdoor programs (Trojan horse) –Zombies Denial of service attacks (DoS)Denial of service attacks (DoS) Distributed denial of service (DDoS) attacksDistributed denial of service (DDoS) attacks Steal information from computers:Steal information from computers: –Credit card numbers –Bank account numbers Internet packet sniffingInternet packet sniffing Commit identity theftCommit identity theft Create widespread computer attacks:Create widespread computer attacks: –Backdoor programs (Trojan horse) –Zombies Denial of service attacks (DoS)Denial of service attacks (DoS) Distributed denial of service (DDoS) attacksDistributed denial of service (DDoS) attacks NEXT SLIDE

30 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.30 How Hackers Gain Access Direct access:Direct access: –Hacking software Indirect access:Indirect access: –Internet connection –Logical ports HTTP: 80 HTTP: 80 SMTP: 25 SMTP: 25 Direct access:Direct access: –Hacking software Indirect access:Indirect access: –Internet connection –Logical ports HTTP: 80 HTTP: 80 SMTP: 25 SMTP: 25 NEXT SLIDE

31 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.31 Computer Safeguards FirewallsFirewalls Viruses and antivirus softwareViruses and antivirus software FirewallsFirewalls Viruses and antivirus softwareViruses and antivirus software NEXT SLIDE

32 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.32 FirewallsFirewalls Software programs or hardware designed to close logical ports to invadersSoftware programs or hardware designed to close logical ports to invaders Types of firewalls:Types of firewalls: –Norton Personal Firewall –McAfee Firewall –Zone Alarm –BlackICE PC Protection –Network routers Software programs or hardware designed to close logical ports to invadersSoftware programs or hardware designed to close logical ports to invaders Types of firewalls:Types of firewalls: –Norton Personal Firewall –McAfee Firewall –Zone Alarm –BlackICE PC Protection –Network routers NEXT SLIDE

33 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.33 Is your computer secure? Gibson Research CorporationGibson Research Corporation –www.grc.com www.grc.com –ShieldsUP –LeakTest QualysQualys –http://browsercheck.qualys.com http://browsercheck.qualys.com Gibson Research CorporationGibson Research Corporation –www.grc.com www.grc.com –ShieldsUP –LeakTest QualysQualys –http://browsercheck.qualys.com http://browsercheck.qualys.com

34 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.34 Chapter 7 Summary Questions What is a network and what are the advantages of setting up one?What is a network and what are the advantages of setting up one? What is the difference between a client/server network and a peer-to-peer network?What is the difference between a client/server network and a peer-to-peer network? What are the main components of every network?What are the main components of every network? What are the most common home networks?What are the most common home networks? What is a network and what are the advantages of setting up one?What is a network and what are the advantages of setting up one? What is the difference between a client/server network and a peer-to-peer network?What is the difference between a client/server network and a peer-to-peer network? What are the main components of every network?What are the main components of every network? What are the most common home networks?What are the most common home networks? NEXT SLIDE

35 Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.35 Chapter 7 Summary Questions What are power line networks?What are power line networks? What are phone line networks?What are phone line networks? What are Ethernet networks?What are Ethernet networks? What are wireless networks?What are wireless networks? How can hackers attack a network and what harm can they cause?How can hackers attack a network and what harm can they cause? What is a firewall and how does it keep my computer safe from hackers?What is a firewall and how does it keep my computer safe from hackers? What are power line networks?What are power line networks? What are phone line networks?What are phone line networks? What are Ethernet networks?What are Ethernet networks? What are wireless networks?What are wireless networks? How can hackers attack a network and what harm can they cause?How can hackers attack a network and what harm can they cause? What is a firewall and how does it keep my computer safe from hackers?What is a firewall and how does it keep my computer safe from hackers? NEXT SLIDE


Download ppt "Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Chapter 6 Summary Questions How can I determine whether I should upgrade my existing computer."

Similar presentations


Ads by Google