Network Fundamentals. Chapter 7: Networking and Security 4. Network Fundamentals. Network Architecture

Size: px
Start display at page:

Download "Network Fundamentals. Chapter 7: Networking and Security 4. Network Fundamentals. Network Architecture"

Transcription

1 Network Fundamentals Chapter 7: Networking and Security CS10001 Computer Literacy Network Two or more computers connected by hardware or software so that they can communicate with each other Nodes Devices connected to a network Computers Peripherals Modems Chapter 7: Networking and Security 1 Chapter 7: Networking and Security 2 Network Fundamentals Network Benefits Sharing peripherals via external storage Sharing files between or among computers via shared directories Sharing a broadband Internet connection via a router Network Architecture Two methods of design 1. The way in which they are controlled Locally Centrally 2. The distance between the network nodes Chapter 7: Networking and Security 3 Chapter 7: Networking and Security 4 1

2 Network Designs Way in which they are controlled Locally Controlled Peer-to-peer or P2P Nodes are considered to be peers Easy to set up Popular for home applications Network Designs Way in which they are controlled Centrally Controlled Communication between client and server Control dictated by the server Contains >= 10 nodes Beneficial in business applications Chapter 7: Networking and Security 5 Chapter 7: Networking and Security 6 Network Designs Network Components The distance between nodes LANs Local area networks Nodes located in a small geographic area (labs) WANs Wide area networks LANs connected over long distances (separate campuses) Networks need the following to function 1. A means of connecting nodes via a transmission media (cable or wireless) 2. Special devices to allow node communication 3. Software to run the network Chapter 7: Networking and Security 7 Chapter 7: Networking and Security 8 2

3 Network Functions Network Functions A means of connecting nodes via a transmission media Types or forms available 1. Existing wiring (telephone lines) 2. Cables (twisted pair, coaxial, fiberoptic) 3. Wireless (radio waves) A means of connecting nodes via a transmission media cont d. Speeds 1. Bandwidth is the maximum speed of transmission between nodes (Mbps) 2. Throughput is the actual speed of transmission and is often less than bandwidth (Mbps) Chapter 7: Networking and Security 9 Chapter 7: Networking and Security 10 Network Functions Network Functions Special devices to allow node Special devices to allow node communication communication Network adapters Network navigation devices Installed internally on the motherboard in the nodes Assist in the transmission of data packets between nodes Connected externally via USB ports on the Available via network adapters (simple nodes networks) Installed internally as expansion cards Handled via special navigation devices (network interface cards) (complex networks) Chapter 7: Networking and Security 11 Chapter 7: Networking and Security 12 3

4 Network Functions Network Functions Special devices to allow node communication Handled via special navigation devices (complex networks) Routers transfer data between networks (home and Internet) Switches transfer data inside a network to the intended node Software to run the network Home networks need operating systems to support P2P Vista Home, XP Home, 2000, 98 Client/server networks require that the server have a network operating system installed Vista Enterprise, XP Professional, Server 2003, Novell Chapter 7: Networking and Security 13 Chapter 7: Networking and Security Wired Ethernet networks 2. Wireless Ethernet networks 3. Power-line networks 4. Phoneline networks Wired Ethernet networks Use the IEEE standard that determines node communication (802.3) Extremely efficient because of complex algorithms Require special navigation devices (routers and switches) Data transmission rate = 100Mbps or 1,000Mpbs Chapter 7: Networking and Security 15 Chapter 7: Networking and Security 16 4

5 Wired Ethernet networks cont d. Wired Ethernet networks cont d. Network adapters or network interface Switches transfer the data packets to cards are required the destination node Nodes connected by UTP Cable Hubs may be used as another special (unshielded twisted pair cable) and navigation device to broadcast to all Ethernet connectors (RJ-45) intended nodes UTP cable runs are <= 328 feet Router required to transfer data packets Requires repeaters to amplify the signal between networks (home to Internet) if UTP cable run > 328 feet Chapter 7: Networking and Security 17 Chapter 7: Networking and Security 18 Wireless Ethernet networks Wireless Ethernet networks cont d. Use radio waves as the transmission Wireless network adapters are required media between nodes Internally on the motherboard Use the IEEE standard determining node communication ( for Wireless Fidelity or Wi-Fi) a, b, g, n Differences are the data transfer rate and types of security support Internally as expansion slots Externally as USB devices Transceivers translate the electronic data from the nodes into radio waves, broadcasting the radio waves to all other nodes (also receives signals) Chapter 7: Networking and Security 19 Chapter 7: Networking and Security 20 5

6 Wireless Ethernet networks cont d. Wireless Ethernet networks cont d. Requires a gateway (wireless router) for Problems commonly associated include Internet connection Decreased throughtput because distances May require wireless access points (WAP) to assist with connection problems caused by interference or distance constraints are shorter (about 250 feet) between nodes IEEE standards with 2.4GHz bandwidth may interfere with other devices (cell phones) Interference from objects (walls, large objects) Chapter 7: Networking and Security 21 Chapter 7: Networking and Security 22 Power-line networks Power-line networks Use existing electrical wiring to connect Less popular than Ethernet networks network nodes (any electrical outlet) Bandwidth limitations Data transfer rate of 14Mbps-200Mbps Cost considerations set by the Home Plug Power Line Recent standard upgrades have Alliance resulted in greater throughput, so See for details. popularity could increase Chapter 7: Networking and Security 23 Chapter 7: Networking and Security 24 6

7 Home Network Safety Phoneline networks Uses conventional phone lines for data transmission Requires each node have a home phoneline network adapter installed on each node and then plug into a phone jack Very unpopular, but sometimes suitable Cybercrime Criminal activity perpetrated through computer usage by cybercriminals Internet Networks Personal computers Chapter 7: Networking and Security 25 Chapter 7: Networking and Security 26 Home Network Safety A hacker is anyone breaking into an individual computer or network by unlawful means White-hat hacker breaks into systems for a challenge or to expose network security breaches Black-hat hacker breaks into systems for illegal gain or to destroy information Home Network Safety Script kiddies are amateur hackers that use tools developed by sophisticated hackers Malicious Relatively easy to find through electronic tracks Chapter 7: Networking and Security 27 Chapter 7: Networking and Security 28 7

8 Hacker Threats Use of packet sniffers Looks at all data packets traveling the Internet Looks for personal information Potential for identity theft Hacker Threats Use of Trojan horses Harmless programs with malicious background activity Uses backdoor programs Infected computers become zombies Chapter 7: Networking and Security 29 Chapter 7: Networking and Security 30 Hacker Threats Denial of Service Attacks (DoS) Hackers request repeated instructions from zombie computers they created Zombies shut down or are bogged down from the flood of requests Hacker Threats Distributed Denial of Service (DDoS) Less traceable than DoS attacks Many zombies coordinate request attacks to the same computer simultaneously Chapter 7: Networking and Security 31 Chapter 7: Networking and Security 32 8

9 Hacker Threats - Viruses Boot-sector viruses Replicates itself in the Master Boot Record before virus protection is loaded Occurs from leaving infected storage devices in drives during startup Hacker Threats - Viruses Logic bombs and time bombs Logic bombs are viruses triggered by satisfied logical conditions Time bombs are viruses triggered by dates or time passages Chapter 7: Networking and Security 33 Chapter 7: Networking and Security 34 Hacker Threats - Viruses Worms Spreads through computer systems via network connections Attaches to a commonly executed host file Spreads rapidly Hacker Threats - Viruses Script and macro viruses Mini-programs executed without knowledge Via Internet activity (watching clips) Via attachments Chapter 7: Networking and Security 35 Chapter 7: Networking and Security 36 9

10 Hacker Threats - Viruses Encryption viruses Performs electronic blackmail Important system or application files kidnapped by hacker, then encrypted Hacker Threats - Viruses Trojan horses Performs maliciously in the background Pretends to offer a useful utility Infected user pays for return of files Chapter 7: Networking and Security 37 Chapter 7: Networking and Security 38 Virus Classifications Polymorphic Usually infects one file and recodes itself periodically Multipartite Infects multiple file types in an effort to fool the antivirus software Stealth Combating Hackers and Viruses Firewall Used to close off logical (internal) ports to hackers May be in the form of software programs or hardware devices Attempts to hide from antivirus software through temporary erasure Chapter 7: Networking and Security 39 Chapter 7: Networking and Security 40 10

Technology in Action

Technology in Action Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses 1 Peer-to-Peer Networks Nodes communicate with each other Peers Share peripheral

More information

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. CS Chapter 7 Study Guide _ MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) Throughput, the actual speed of data transfer that is achieved in a

More information

Technology in Action. Chapter Topics. Participation Question. Participation Question 8/17/11. Chapter 7 Networking: Connecting Computing Devices

Technology in Action. Chapter Topics. Participation Question. Participation Question 8/17/11. Chapter 7 Networking: Connecting Computing Devices Technology in Action Chapter 7 Networking: Connecting Computing Devices 1 2 Chapter Topics Networking fundamentals Network architecture Network components Peer-to-peer networks Ethernet networks Power-line

More information

Technology in Action. Chapter 12 Behind the Scenes: Networking and Security. Copyright 2010 Pearson Education, Inc. Publishing as Prentice Hall

Technology in Action. Chapter 12 Behind the Scenes: Networking and Security. Copyright 2010 Pearson Education, Inc. Publishing as Prentice Hall Technology in Action Chapter 12 Behind the Scenes: Networking and Security 1 Networking Advantages Networks Increase productivity Enable the sharing of hardware resources Facilitate knowledge sharing Enable

More information

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks

More information

Discovering Computers Chapter 9 Communications and Networks

Discovering Computers Chapter 9 Communications and Networks Discovering Computers 2009 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the components required for successful communications Identify various sending and receiving devices Describe

More information

Types Of Computer Virus Sources Of Virus Virus Warning Signs Virus Detection(Anti-Virus) Virus Prevention and Removal

Types Of Computer Virus Sources Of Virus Virus Warning Signs Virus Detection(Anti-Virus) Virus Prevention and Removal DATA PROCESSING NOTES FOR SS THREE FIRST TERM 2016/2017 SESSION SCHEME OF WORK Week 3 Week 4 Continuation of Spreadsheet(Practical) Computer Virus Types Of Computer Virus Sources Of Virus Virus Warning

More information

What is a Network? A connection of two or more computers so that they can share resources.

What is a Network? A connection of two or more computers so that they can share resources. NETWORKS What is a Network? A connection of two or more computers so that they can share resources. Network Benefits Remote access Sharing files & resources Communication Cost Maintenance Communication

More information

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks

More information

Chapter 5 Local Area Networks. Computer Concepts 2013

Chapter 5 Local Area Networks. Computer Concepts 2013 Chapter 5 Local Area Networks Computer Concepts 2013 5 Chapter Contents Section A: Network Building Blocks Section B: Wired and Wireless Technologies Section C: Network Setup Section D: Sharing Files Section

More information

What is a network and what are the advantages of setting up one? (p. 262)

What is a network and what are the advantages of setting up one? (p. 262) CHAPTER 7 OBJECTIVES After reading this chapter, you should be able to answer the following questions: What is a network and what are the advantages of setting up one? (p. 262) What is the difference between

More information

Networks. Computer Technology

Networks. Computer Technology Networks Computer Technology Network Two or more computers and other devices (printers or scanners) that are connected, for the purpose of sharing data and programs Advantages of Networks Communication

More information

Networking. Prof. Abdul Hameed

Networking. Prof. Abdul Hameed Networking Prof. Abdul Hameed http://informationtechnology.pk http://informationtechnology.pk 0 Chapter Topics Networking Fundamentals Network Architectures and Components Connecting to the Internet Installing

More information

Chapter Topics Part 1. Network Definitions. Behind the Scenes: Networking and Security

Chapter Topics Part 1. Network Definitions. Behind the Scenes: Networking and Security Chapter Topics Part 1 Behind the Scenes: Networking and Security CS10001 Computer Literacy Business Networks Network Advantages Client/Server Networks Network Classifications Servers Toplogies Chapter

More information

It is the process of sharing data, programs, and information between two or more computers.

It is the process of sharing data, programs, and information between two or more computers. 1 Communications It is the process of sharing data, programs, and information between two or more computers. Numerous applications depend on communication systems: E-mail Instant messaging (IM) Internet

More information

2) A is any device connected to a network such as a computer, printer, or game console. A) packet B) node C) NOS D) NIC

2) A is any device connected to a network such as a computer, printer, or game console. A) packet B) node C) NOS D) NIC Technology In Action, Complete, 14e (Evans et al.) Chapter 7 Networking: Connecting Computing Devices 1) A computer is two or more computers connected using software and hardware so that they can communicate

More information

Computers Are Your Future Eleventh Edition Chapter 7: Networks: Communicating & Sharing Resources

Computers Are Your Future Eleventh Edition Chapter 7: Networks: Communicating & Sharing Resources Computers Are Your Future Eleventh Edition Chapter 7: Networks: Communicating & Sharing Resources Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall 1 All rights reserved. No part of this

More information

COMPUTER SKILLS COMP101

COMPUTER SKILLS COMP101 COMPUTER SKILLS COMP101 Chapter 4 Introduction to Computer Networks Definitions and Terminologies Computer Network A network consists of two or more computers that are linked in order to share resources

More information

Communications and Networks

Communications and Networks Information Technology Skills (DUT 122) CHAPTER 6: Communications and Networks Miss Wan Nor Ashiqin Wan Ali School of Human Development and Technocommunication Objectives Overview Discuss the purpose of

More information

Dr./ Ahmed Mohamed Rabie Sayed

Dr./ Ahmed Mohamed Rabie Sayed 1 Dr./ Ahmed Mohamed Rabie Sayed 2 A network is a group of two or more computer systems linked together to exchange data and share resources, including expensive peripherals. 3 A local area network (LAN)

More information

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005 Network and Telecommunications Basics Chapter Outline The telecommunications system Network services

More information

Objectives Overview. Chapter 9 Networks and Communications. Discovering Computers Instructor: Imran Khalil MSc-IT 1 st semester Fall 2016

Objectives Overview. Chapter 9 Networks and Communications. Discovering Computers Instructor: Imran Khalil MSc-IT 1 st semester Fall 2016 Chapter 9 Networks and Communications Instructor: Imran Khalil MSc-IT 1 st semester Fall 2016 Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Discuss the purpose

More information

Digital Entertainment. Networking Made Easy

Digital Entertainment. Networking Made Easy Digital Entertainment 2003 by TiVo Inc. Reproduction in whole or in part without written permission is prohibited. All rights reserved. Printed in the USA. TiVo, TiVo Central, and TiVolution are registered

More information

Brief Summary of the Chapter: CHAPTER 1 NETWORKING AND OPEN STANDARDS In this chapter we are going to study about computer Networks, associated terminology and related concept along with network devices.

More information

CSC Introduction to Computers and Their Applications

CSC Introduction to Computers and Their Applications CSC 170 - Introduction to Computers and Their Applications Lecture 6 An Introduction to Networks Communication Systems Networks can be classified in many ways; as a network user, you ll want to keep in

More information

VISUAL SUMMARY COMMUNICATION CHANNELS COMMUNICATIONS. Communications and Networks

VISUAL SUMMARY COMMUNICATION CHANNELS COMMUNICATIONS. Communications and Networks Rev.Confirming Pages VISUAL SUMMARY Communications and Networks COMMUNICATIONS COMMUNICATION CHANNELS Communications is the process of sharing data, programs, and information between two or more computers.

More information

Chapter Topics. The History of the Internet. Chapter 7: Computer Networks, the Internet, and the World Wide Web

Chapter Topics. The History of the Internet. Chapter 7: Computer Networks, the Internet, and the World Wide Web Chapter Topics Chapter 7: Computer Networks, the Internet, and the World Wide Web CS10051: Intro. to Computer Science Kent State University History of the Internet History of the World Wide Web Internet

More information

Technology in Action 12/11/2014. Networking Fundamentals. Chapter Topics. Networking Fundamentals (cont.) Networking Fundamentals (cont.

Technology in Action 12/11/2014. Networking Fundamentals. Chapter Topics. Networking Fundamentals (cont.) Networking Fundamentals (cont. Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Technology in Action Chapter 7 Networking: Connecting Computing Devices Eleventh Edition Copyright 2015 Pearson Education, Inc. Copyright

More information

INTRODUCTION TO ICT.

INTRODUCTION TO ICT. INTRODUCTION TO ICT. (Introducing Basic Network Concepts) Lecture # 24-25 By: M.Nadeem Akhtar. Department of CS & IT. URL: https://sites.google.com/site/nadeemcsuoliict/home/lectures 1 INTRODUCTION TO

More information

CompTIA FC0-U51. CompTIA IT Fundamentals.

CompTIA FC0-U51. CompTIA IT Fundamentals. CompTIA FC0-U51 CompTIA IT Fundamentals http://killexams.com/exam-detail/fc0-u51 or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access

More information

Wireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved

Wireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved Wireless Networking Chapter 23 Overview In this chapter, you will learn how to Discuss wireless networking components Analyze and explain wireless networking standards Install and configure wireless networks

More information

CompTIA A+ Accelerated course for & exams

CompTIA A+ Accelerated course for & exams CompTIA A+ Accelerated course for 220-901 & 220-902 exams Course overview Target Audience This course is for Participants wishing to take and pass both CompTIA A+ exams (220-901 and 220-902) exam. It is

More information

Chapter 12. Network Organization and Architecture

Chapter 12. Network Organization and Architecture Chapter 12 Network Organization and Architecture Chapter 12 Objectives Learn the basic physical components of networks. Become familiar with routing protocols. 2 Computer networks are often classified

More information

Technology in Action 12/11/2014. Cybercrime and Identity Theft (cont.) Cybercrime and Identity Theft (cont.) Chapter Topics

Technology in Action 12/11/2014. Cybercrime and Identity Theft (cont.) Cybercrime and Identity Theft (cont.) Chapter Topics Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Eleventh Edition Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright 2015 Pearson Education,

More information

We are going to see a basic definition of the devices you can find in a corporate wired network, so you can understand basic IT engineering jargon.

We are going to see a basic definition of the devices you can find in a corporate wired network, so you can understand basic IT engineering jargon. Computer network devices, also known as communication devices, are the backbone of a data communication network. In this category we can find routers, switches, hubs, LAN cards, gateways, modems, hardware

More information

Chapter 9 Introduction to Networks

Chapter 9 Introduction to Networks Chapter 9 Introduction to Networks 9.1 Uses of a network Networks are used in many situations. We can see networks in places like offices, airports and factories. In fact we use networks in many situations

More information

Naveen Kumar. 1 Wi-Fi Technology

Naveen Kumar. 1 Wi-Fi Technology Naveen Kumar 1 Contents 2 Introduction Need of Purpose History How a Wi-Fi Network Works Topologies & Configurations Applications Wi-Fi Security Advantages & Limitations Innovations Introduction 3 Wireless

More information

Networks: Communicating and Sharing Resources

Networks: Communicating and Sharing Resources Networks: Communicating and Sharing Resources 1 Network Fundamentals Networks o Links multiple computer systems and enables them to share data and resources o Types of computer networks: Local area network

More information

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 16 Networking Types, Devices, and Cabling

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 16 Networking Types, Devices, and Cabling A+ Guide to Managing & Maintaining Your PC, Chapter 16 Networking Types, Devices, and Cabling Objectives Learn about network types and topologies Learn about the hardware used to build local networks Learn

More information

CERT-In. Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES

CERT-In. Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES CERT-In Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES Department of Information Technology Ministry of Communications and Information Technology Government of India Anti Virus

More information

Unit 09 Computer Networks

Unit 09 Computer Networks Unit 09 Computer Networks Gain a knowledge about network devices. Discuss what network devices are required to create a basic network Draw a bespoke network drawing using Visio 2 In order to setup a network

More information

Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT

Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT Network Basics Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT E-mail :Agha.m@mcit.gov.af Cell:0700148122 After this lesson,you will be able to : Define

More information

e-commerce Study Guide Test 2. Security Chapter 10

e-commerce Study Guide Test 2. Security Chapter 10 e-commerce Study Guide Test 2. Security Chapter 10 True/False Indicate whether the sentence or statement is true or false. 1. Necessity refers to preventing data delays or denials (removal) within the

More information

Online Threats. This include human using them!

Online Threats.   This include human using them! Online Threats There are many dangers from using the web (and computer in general). One should watch out for malware, automated programs designed to cause harm to you, your data, and your system. You are

More information

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low Chapter 15 Networking Concepts 1. Define networking. It is the interconnection of independent computing devices for sharing of information over shared medium. 2. What is the need for networking? / What

More information

Essential Elements of Medical Networks. D. J. McMahon rev cewood

Essential Elements of Medical Networks. D. J. McMahon rev cewood Essential Elements of Medical Networks D. J. McMahon 141004 rev cewood 2018-02-18 Key Points Medical Networks: quick conversion of bits to decimal numbers: 2 10 = 1024 1000 = 10 3 OSI Networking Layers

More information

Review: Networking Fall Final

Review: Networking Fall Final Review: Networking Fall Final Question 1 of 43 You have implemented a network where each device provides shared files with all other devices on the network. What type of network do you have? Peer to peer

More information

Internet protocols and network hardware

Internet protocols and network hardware Internet protocols and network hardware Protocols are sets of rules or standards that are used for communication. They work together to help devices to communicate. The rules apply to different layers

More information

Home Networking. A home network generally conforms to one of the following configurations

Home Networking. A home network generally conforms to one of the following configurations Home Networking A home network generally conforms to one of the following configurations A stand-alone computer connected to the Internet. A peer-to-peer network containing two or more computers with no

More information

Fundamentals of Information Systems Security Lesson 8 Mitigation of Risk and Threats to Networks from Attacks and Malicious Code

Fundamentals of Information Systems Security Lesson 8 Mitigation of Risk and Threats to Networks from Attacks and Malicious Code Fundamentals of Information Systems Security Lesson 8 Mitigation of Risk and Threats to Networks from Attacks and Malicious Code Learning Objective Explain the importance of network principles and architecture

More information

Network Security Fundamentals

Network Security Fundamentals Network Security Fundamentals Security Training Course Dr. Charles J. Antonelli The University of Michigan 2013 Network Security Fundamentals Module 5 Viruses & Worms, Botnets, Today s Threats Viruses

More information

Pengantar Teknologi Informasi dan Teknologi Hijau. Suryo Widiantoro, ST, MMSI, M.Com(IS)

Pengantar Teknologi Informasi dan Teknologi Hijau. Suryo Widiantoro, ST, MMSI, M.Com(IS) Pengantar Teknologi Informasi dan Teknologi Hijau Suryo Widiantoro, ST, MMSI, M.Com(IS) 1 Topics covered 1. From analog to digital age 2. Networks 3. Wired-communication data 4. Wireless-communication

More information

Appendix B Networks, Routing, and Firewall Basics

Appendix B Networks, Routing, and Firewall Basics Appendix B Networks, Routing, and Firewall Basics This appendix provides an overview of IP networks, routing, and firewalls. Related Publications As you read this document, you may be directed to various

More information

Chapter 10: Security and Ethical Challenges of E-Business

Chapter 10: Security and Ethical Challenges of E-Business Chapter 10: Security and Ethical Challenges of E-Business Learning Objectives Identify several ethical issues in IT that affect employment, individuality, working condition, privacy, crime health etc.

More information

Chapter 11: Networks

Chapter 11: Networks Chapter 11: Networks Devices in a Small Network Small Network A small network can comprise a few users, one router, one switch. A Typical Small Network Topology looks like this: Device Selection Factors

More information

Bluetooth. 3.3 Latest Technology in Wireless Network. What is BLUETOOTH: Bluetooth 2/17/2016

Bluetooth. 3.3 Latest Technology in Wireless Network. What is BLUETOOTH: Bluetooth 2/17/2016 3.3 Latest Technology in Wireless Network Bluetooth Bluetooth Bluetooth is a high-speed, low-power microwave wireless link technology, designed to connect phones, laptops, PDAs and other portable equipment

More information

Networks. Unit 5 Terminology Study Assignment Review Computer Technology. S3 Obj 2 1-3

Networks. Unit 5 Terminology Study Assignment Review Computer Technology. S3 Obj 2 1-3 Networks Unit 5 Terminology Study Assignment Review Computer Technology S3 Obj 2 1-3 Network A computer network, or simply a network, is a collection of computers and other hardware components interconnected

More information

Downloaded from

Downloaded from Unit-V Network and Communication Technology Network and Communication Technology Chapter: 09 A Network is a collection of interconnected autonomous computers. A Computer which is a part of a network is

More information

CONTENTS IN DETAIL INTRODUCTION

CONTENTS IN DETAIL INTRODUCTION CONTENTS IN DETAIL ACKNOWLEDGMENTS xiii INTRODUCTION xv 1 HOW A NETWORK WILL IMPROVE YOUR LIFE 1 What s a Network?... 2 Sneakernet... 3 Data Networks and What You Can Do with Them... 4 File Sharing...

More information

The ULTIMATE GUIDE. to Buying Networking Equipment

The ULTIMATE GUIDE. to Buying Networking Equipment The ULTIMATE GUIDE to Buying Networking Equipment 1 Networks allow people to share information, resources and devices. Built with a combination of computer hardware and software,networks vary in their

More information

CS 3201 Computer Networks 2014/2015 Handout: Lab 3

CS 3201 Computer Networks 2014/2015 Handout: Lab 3 Lab Content: - Network Devices - Ethernet Network - MAC Address Network Devices: - Hubs, MAU s, and Repeaters Hubs Hubs are one of the most important components of a network because they act as a central

More information

Configuring your Home Wireless Network

Configuring your Home Wireless Network Configuring your Home Wireless Network Questions How many of you have more than one computer at home? How many of you connect to the Internet using broadband (Cable or DSL) How many already have a home

More information

Home and Wireless Networks 7

Home and Wireless Networks 7 Contents Contents= 1 2 3 Home and Wireless Networks 7 What is a Home Network? 8 Wired Ethernet 10 Phoneline Network 11 Powerline Network 12 Wireless Home Networking 13 How Networks Operate 14 Peer Group

More information

PRINCE GEORGE'S COMMUNITY COLLEGE OFFICE OF INSTRUCTION MASTER COURSE SYLLABUS

PRINCE GEORGE'S COMMUNITY COLLEGE OFFICE OF INSTRUCTION MASTER COURSE SYLLABUS PRINCE GEORGE'S COMMUNITY COLLEGE OFFICE OF INSTRUCTION MASTER COURSE SYLLABUS CIS 101 Computer Literacy Michael Burt 12/19/2006 Course Designator and Title Prepared by Date Barry Bugg ` Dr. Aaron Stucker

More information

802.11N Wireless Broadband Router

802.11N Wireless Broadband Router 802.11N Wireless Broadband Router Pre-N Wireless Access Point Broadband Internet Access WPS 4-Port Switching Hub User's Guide Table of Contents CHAPTER 1 INTRODUCTION... 1 Wireless Router Features... 1

More information

The Features and Uses of Computer Networking. Unit 11 Task 1

The Features and Uses of Computer Networking. Unit 11 Task 1 The Features and Uses of Computer Networking Unit 11 Task 1 Features Office Network Peer to peer A peer to peer network is mostly used in homes or small businesses. The network consists of two or more

More information

Lecture #25: Networks and Communications. Communication and Networks. What will we learn?

Lecture #25: Networks and Communications. Communication and Networks. What will we learn? Lecture #25: Networks and Communications Communication and Networks What will we learn? How a communications system works What a network is What networks used for What network operating systems do What

More information

(Network Programming) Basic Networking Hardware

(Network Programming) Basic Networking Hardware EEE 448 Computer Networks with (Network Programming) Basic Networking Hardware Lecture #2 Dept of Electrical and Electronics Engineering Çukurova University Agenda What is a network device? Network Media

More information

Lecture 12. Application Layer. Application Layer 1

Lecture 12. Application Layer. Application Layer 1 Lecture 12 Application Layer Application Layer 1 Agenda The Application Layer (continue) Web and HTTP HTTP Cookies Web Caches Simple Introduction to Network Security Various actions by network attackers

More information

Networks. Unit 5 Terminology Study Assignment Review Computer Technology. S3 Obj 2

Networks. Unit 5 Terminology Study Assignment Review Computer Technology. S3 Obj 2 Networks Unit 5 Terminology Study Assignment Review Computer Technology S3 Obj 2 Network A computer network, or simply a network, is a collection of computers and other hardware components interconnected

More information

Ethics and Information Security. 10 주차 - 경영정보론 Spring 2014

Ethics and Information Security. 10 주차 - 경영정보론 Spring 2014 Ethics and Information Security 10 주차 - 경영정보론 Spring 2014 Ethical issue in using ICT? Learning Outcomes E-policies in an organization relationships and differences between hackers and viruses relationship

More information

A Guide to Routers. Connectivity Type. ADSL (Telephone Type)

A Guide to Routers. Connectivity Type. ADSL (Telephone Type) A Guide to Routers Besides enabling wireless internet connections, routers also keep sensitive data private by safeguarding networks. Wireless routers are increasingly common, even in public spaces. This

More information

Networking Fundamentals

Networking Fundamentals Networking Fundamentals Cable types and connectors Fiber A fiber optic cable consists of a bundle of glass threads, each of which is capable of transmitting messages modulated onto light waves. Fiber optics

More information

COPYRIGHTED MATERIAL. Index

COPYRIGHTED MATERIAL. Index Index Symbols and Numbers $ (dollar sign), in folder share names, 117 802.11a standard definition, 22 speed, 26 802.11b standard 802.11g standard 802.11i standard, 23 A access points compatibility, 45

More information

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 17 Windows Resources on a Network

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 17 Windows Resources on a Network Chapter 17 Windows Resources on a Network Objectives Learn how to support some client/server applications Learn how to share and secure files and folders on the network Learn how to troubleshoot network

More information

COMPUTER TECHNIQUE. ( Vocational Stream ) Paper : V. ( Computer Network ) ( Theory )

COMPUTER TECHNIQUE. ( Vocational Stream ) Paper : V. ( Computer Network ) ( Theory ) Total No. of Printed Pages 12 HS/XII/V/CT/Paper V/14 2 0 1 4 COMPUTER TECHNIQUE ( Vocational Stream ) Paper : V ( Computer Network ) ( Theory ) Full Marks : 100 Time : 3 hours The figures in the margin

More information

Full file at

Full file at Computer Networking: A Top-Down Approach Featuring the Internet, 4th Edition Solutions to Review Questions and Problems Version Date: October 29, 2007 This document contains the solutions to review questions

More information

Chapter 6 Network and Internet Security and Privacy

Chapter 6 Network and Internet Security and Privacy Chapter 6 Network and Internet Security and Privacy Learning Objectives LO6.1: Explain network and Internet security concerns LO6.2: Identify online threats LO6.3: Describe cyberstalking and other personal

More information

CCNA 1 Chapter 5. Cabling LANs and WANs

CCNA 1 Chapter 5. Cabling LANs and WANs CCNA 1 Chapter 5 Cabling LANs and WANs Overview Even though each local-area network is unique, there are many design aspects that are common to all LANs. For example, most LANs follow the same standards

More information

Wireless Attacks and Countermeasures

Wireless Attacks and Countermeasures Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections

More information

Installing and Configuring

Installing and Configuring Installing and Configuring Advanced Hardware Setups Introduction For most community wireless networks, installing a few rooftop and window nodes will fit the needs of the neighborhood or town. For others,

More information

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each. Name Date Chapter 10: Security After completion of this chapter, students should be able to: Explain why security is important and describe security threats. Explain social engineering, data wiping, hard

More information

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

Data Communication. Chapter # 5: Networking Threats. By: William Stalling Data Communication Chapter # 5: By: Networking Threats William Stalling Risk of Network Intrusion Whether wired or wireless, computer networks are quickly becoming essential to everyday activities. Individuals

More information

Introduction to Computers Chapter1

Introduction to Computers Chapter1 Introduction to Computers Chapter1 IS-IT-UOB 2013 Topics Covered Computer definition and main parts Computer Hardware Computer Software Computer Strengths Categories of Computers Computer Applications

More information

Wireless technology Principles of Security

Wireless technology Principles of Security Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the

More information

Security SSID Selection: Broadcast SSID:

Security SSID Selection: Broadcast SSID: 69 Security SSID Selection: Broadcast SSID: WMM: Encryption: Select the SSID that the security settings will apply to. If Disabled, then the device will not be broadcasting the SSID. Therefore it will

More information

An Introduction to Virus Scanners

An Introduction to Virus Scanners From the SelectedWorks of Umakant Mishra August, 2010 An Introduction to Virus Scanners Umakant Mishra Available at: https://works.bepress.com/umakant_mishra/76/ An Introduction to Virus Scanners Umakant

More information

E-companion. Quiz for IT-knowledge

E-companion. Quiz for IT-knowledge E-companion Quiz for IT-knowledge 1. The is used in combination with other keys to perform shortcuts and special tasks. A) Control (Ctrl) key B) Function key C) Toggle key D) Windows key 2. is the place

More information

Fundamentals of Networking Introduction to Networking Devices

Fundamentals of Networking Introduction to Networking Devices Fundamentals of Networking Introduction to Networking Devices Kuldeep Sonar 1 NIC (Network Interface Card) A network interface provides connectivity from an end-user PC or laptop to the public network.

More information

Computer to Network Connection

Computer to Network Connection Computer to Network Connection Network Installation Steps Having a clear understanding of all the steps required to physically building a network improves the success of a project. You may need to install

More information

Chapter 10: Planning and Cabling Networks

Chapter 10: Planning and Cabling Networks Chapter 10: Planning and Cabling Networks Before using an IP phone, accessing instant messaging, or conducting any number of other interactions over a data network, we must connect end devices and intermediary

More information

Computer Networks and Internet

Computer Networks and Internet Computer Networks and Internet Objectives Computer Networks Internet 2 Computer Networks Introducing Computer Networks A computer network consists of two or more computers linked together to exchange data

More information

Network Communications Standards. Applied Information Technology

Network Communications Standards. Applied Information Technology Network Communications Standards Applied Information Technology Network Standards Why do we need network standards? Defined guidelines for how computers or networked devices communicate Think of it as

More information

Lesson 1: Network Communications

Lesson 1: Network Communications Lesson 1: Network Communications This lesson introduces the basic building blocks of network communications and some of the structures used to construct data networks. There are many different kinds of

More information

Computers Are Your Future

Computers Are Your Future Computers Are Your Future Networks: Communicating and Sharing Resources. Network Fundamentals What You Will Learn About Basic networking concepts Advantages and disadvantages of networks Peer-to-peer and

More information

A Review Paper on Network Security Attacks and Defences

A Review Paper on Network Security Attacks and Defences EUROPEAN ACADEMIC RESEARCH Vol. IV, Issue 12/ March 2017 ISSN 2286-4822 www.euacademic.org Impact Factor: 3.4546 (UIF) DRJI Value: 5.9 (B+) A Review Paper on Network Security Attacks and ALLYSA ASHLEY

More information

Multi-Homing Broadband Router. User Manual

Multi-Homing Broadband Router. User Manual Multi-Homing Broadband Router User Manual 1 Introduction... 4 Features... 4 Minimum Requirements... 4 Package Content... 4 Note... 4 Get to know the Broadband Router... 5 Back Panel... 5 Front Panel...

More information

Chapter 13: Advanced Laptops and Portable Devices

Chapter 13: Advanced Laptops and Portable Devices Chapter 13: Advanced Laptops and Portable Devices IT Essentials: PC Hardware and Software v4.1 1 Chapter 13 Objectives 13.1 Describe wireless communication methods for laptops and portable devices 13.2

More information

Networks: Communicating and Sharing Resources

Networks: Communicating and Sharing Resources Networks: Communicating and Sharing Resources 1 Local Area Networks Client/server networks o Made up of one or more file servers and clients (any type of computer) o Client software enables requests to

More information

Wireless (Select Models Only) User Guide

Wireless (Select Models Only) User Guide Wireless (Select Models Only) User Guide Copyright 2008 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Bluetooth is a trademark owned by its

More information