SlideShare a Scribd company logo
1 of 30
Computers,
part of your
life
1
MODULE 2.1
Local area networks
2
Contents
 What is a network?
 Basic components of a
network
 Advantages and
disadvantages of a LAN and
WLAN
 Basic network security
 Ethical use of networks
 Test and improve your
knowledge
3
A NETWORK
is a collection of computers or
other computing devices that are
connected by some sort of
communication media (either via
cable or wirelessly) to allow users
to share software, hardware, data
and information, and to
communicate.
What is a network?
4
What is a network? LAN
 A local area network (LAN) is a network connecting
computers in a small area such as a school, university
campus or company offices in one building.
5
What is a network? LAN
A local area network (LAN)
• is a network connecting computers in a small area
such as a school, university campus or company offices
in one building.
A wireless LAN (WLAN)
• is a LAN which uses wireless (radio waves) to
communicate rather than cables.
An intranet
• is an organisation’s private network and is an Internet-
like environment consisting of web pages relating to
the organisation’s business.
6
Computers and peripherals
Workstations
desktop
compu
ters
laptops iPads
Smart
phones
Server
file
server
e-mail
servers
Internet
or proxy
servers
print
servers
Basic components of a network:
Hardware
7
Basic components of a network:
Hardware
Network interface controller
allow the computer
to communicate with
the network
built into the
motherboard of all
computers
Switch
hardware device
used to connect
computers in a
network so that
communication can
occur
8
9
Network
Interface
Controller
Switch
Data transmission speed
10
Data transmission speed is the rate at which data is
transferred over the media used.
 Cabled networks: 10/100/1000 – this refers to
the data transmission speed that the NIC can
support – 10 Mbps/100Mbps/1000Mbps.
 Multiple speeds = max speed depends one type of
cabling and equipment used in network. NIC
automatically detects and operates at the fastest
speed.
Data transmission speed
11
 Wireless NIC: 802.11 (g or n) – indicates speed that
wireless network is capable of.
 g = 10Mbps and n = 50Mbps.
 Mix of wireless equipment at different speeds =
speed is determined by slowest component
Data transmission over WLAN is slower than over
(cabled) LAN
Basic components of a network:
Communication media
Wired media
Cables
UTP
(Unshielded
Twisted Pair)
Fibre optic cable
Wireless
wireless access
points
wireless enabled
/ wireless
adaptor
12
13
Unshielded Twisted pair VS. Fibre Optic Cable
Basic components of a network:
Network operating software
Software that controls all the
communication and security in a network.
Most operating systems such as Windows
7.0 have built-in networking capabilities.
For larger networks, specialised ‘Server’
editions of the operating system need to be
installed on the servers
14
How do
you know
that you
are
connected
to a
network?
 Presence of extra (logical)
drives such as U:, V: and T:
which are simply folders on a
server that are appearing and
acting as drives.
 Presence of other computers in
My Network Places.
 Access to devices such as
printers not directly attached to
the computer is possible.
 Indicator showing network
activity in the system tray.
15
Advantages and disadvantages
of a LAN and WLAN
16
Advantages
 Files stored on central
computer (file server)
users access from any
computer in the network.
 Files transferred easily
without the use of devices.
 Software shared by
many users.
 Hardware shared by
many users.
 Security in the network
can be controlled.
 A single Internet
connection shared by
many users.
 Software kept up to date
using a network.
 Software which allows you
to demonstrate or
broadcast to all the
computers in a classroom.
 Internet access
monitored and controlled.
17
Advantages - Wireless
 Easy to add or move
computers as the network
points are not fixed.
 Installation easier than
with a cabled LAN.
 It is easy to provide
network connectivity in
areas where it is difficult to
lay a cable.
 Adds mobility for users
with mobile devices such as
laptops and smartphones.
18
Disadvantages
 A LAN/WLAN can be
expensive to install and
maintain.
 A network
administrator is often
necessary to manage the
network.
 Network security must
be maintained to ensure
that the data on the
network is kept secure.
 If the file server is faulty,
no one can access their
files.
 Security can be
compromised if the WLAN is
not configured correctly to
prevent hacking.
 Unauthorised users may
also make use of your Internet
connection- costing money.
 Performance can decrease
as the number of computers
connected increases.
 Signal could get lost or
interfered with due to
electronic or electrical
interference.
19
Network security refers to policies
(rules) put in place to ensure the
security of a network by preventing
unauthorised access to information
and misuse of the computer network.
Basic network security
• An organisation would not want all their employees to have
access to files to do with the salaries of the employees.
• In a school situation, it is important that pupils do not have
access to tests and exams before they are written or that they
are not able to change their term’s results.
20
When working in a network
environment:
 You use a username and password to gain access to
the network and its resources.
 You will be issued with a username.
 Choose a password that will only be known to you.
 You will be held responsible for any actions done on
the network under your username and password.
21
Example of a ‘good’,
secure password:
Q1w2E3R4t%y
A few rules to follow
 Choose password that is at least 8 characters long.
 The password should contain a mixture of upper and
lowercase letter, numbers and special characters.
 You should not use anything else that is easy to guess
about you. In fact meaningless passwords are the
best.
 Be careful of using passwords that follow a pattern
on the keyboard such as ‘asdf’ or ‘1234’ as these are
also easy to guess.
 You should change your password at least every 2
months.
22
Whenever people are interacting and
sharing resources, there is a need
for acceptable, ethical practices.
Most organisations, including
schools, make use of an acceptable
use policy (AUP) to outline the rights
and responsibilities of its users,
especially in networked
environments.
Ethical use of networks
23
An Acceptable Use Policy (AUP) needs to be
frequently updated and is put in place to
 clearly list what the users are permitted and not
permitted to do in order to protect them when they are
using computers and when they are online.
 include basic netiquette rules and responsible
computer usage, as well as any other restrictions the
organisation might feel is necessary to implement such
as restrictions related to Internet usage.
 serve as a contract between the organisation and
the user summarising what they can and can’t do as
well as possible consequences of not complying with the
policy.
 put the duty of using the network in a responsible and
ethical way, on the user.
24
What should be included in an AUP? (1/2)
 A code of conduct with respect to
 ethical, legal and safe use
 privacy of other users
 forms of online communication
 restrictions on the amount of data and
information downloaded from the Internet
 accessing sites with objectionable/offensive
material as defined by the laws of the country
25
What should be included in an AUP?(2/2)
 Details on when and where portable storage devices
may be used
 Details of restrictions about installing any hardware or
software
 Procedures to follow if users find they are victims of
identity theft, malware such as viruses, cyber bullying or
cyber stalking
 Hints to avoid plagiarism and the breaking of copyright
law
 Clear consequences of violating conditions spelt out
in the AUP
26
Test and improve your
knowledge
27
Overview of module
What is ?
Network
LAN
WLAN
Basic
components
Hardware:
• Computers
• Peripherals
• NIC
• Switch
Communicati
on media:
• Wired
• Wireless
Network
operating
software
Advantages
and
Disadvantages
LAN/WLAN
Network
security
Passwords
Ethical use
of networks
AUP
28
Important terms and concepts
Intranet
Local area
network
(LAN)
Network
Network
interface
controller
(NIC)
Network
operating
software
Network
security
Server Switch
Wireless local
area network
(WLAN)
29
Written
module
activity
30

More Related Content

What's hot

Chapter 9 security privacy csc
Chapter 9 security privacy cscChapter 9 security privacy csc
Chapter 9 security privacy cscHisyam Rosly
 
Modern computer network technologies
Modern computer network technologies Modern computer network technologies
Modern computer network technologies Shamima Akther
 
Internet, Intranet & Extranet & IP and MAC
Internet, Intranet & Extranet & IP and MACInternet, Intranet & Extranet & IP and MAC
Internet, Intranet & Extranet & IP and MACAsmita Singh
 
Internet intranet extranet aaa
Internet intranet extranet aaaInternet intranet extranet aaa
Internet intranet extranet aaaDhani Ahmad
 
CHAP 3 - NETWORK, INTRANET & INTERNET
CHAP 3 - NETWORK, INTRANET & INTERNETCHAP 3 - NETWORK, INTRANET & INTERNET
CHAP 3 - NETWORK, INTRANET & INTERNETCikgu Johan Johari
 
Internet vs intranet vs extranet
Internet vs intranet vs extranetInternet vs intranet vs extranet
Internet vs intranet vs extranetMohsinHusenManasiya
 
Chapter 8
Chapter 8Chapter 8
Chapter 8uabir
 
Basic concept of Computer networks
Basic concept of Computer networks Basic concept of Computer networks
Basic concept of Computer networks ShohanaakterKakon
 
IT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for MidtermIT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for MidtermMark John Lado, MIT
 
Computer network
Computer networkComputer network
Computer networkHazratAli82
 
The internet and online services
The internet and online servicesThe internet and online services
The internet and online servicesSmritiGurung4
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityUniversitas Pembangunan Panca Budi
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 

What's hot (20)

Chapter 9 security privacy csc
Chapter 9 security privacy cscChapter 9 security privacy csc
Chapter 9 security privacy csc
 
Campus Area Network Security
Campus Area Network SecurityCampus Area Network Security
Campus Area Network Security
 
Modern computer network technologies
Modern computer network technologies Modern computer network technologies
Modern computer network technologies
 
Internet, Intranet & Extranet & IP and MAC
Internet, Intranet & Extranet & IP and MACInternet, Intranet & Extranet & IP and MAC
Internet, Intranet & Extranet & IP and MAC
 
Internet intranet extranet aaa
Internet intranet extranet aaaInternet intranet extranet aaa
Internet intranet extranet aaa
 
Intranet and extranet
Intranet and extranetIntranet and extranet
Intranet and extranet
 
CHAP 3 - NETWORK, INTRANET & INTERNET
CHAP 3 - NETWORK, INTRANET & INTERNETCHAP 3 - NETWORK, INTRANET & INTERNET
CHAP 3 - NETWORK, INTRANET & INTERNET
 
Internet vs intranet vs extranet
Internet vs intranet vs extranetInternet vs intranet vs extranet
Internet vs intranet vs extranet
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Basic concept of Computer networks
Basic concept of Computer networks Basic concept of Computer networks
Basic concept of Computer networks
 
IT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for MidtermIT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for Midterm
 
Computer network
Computer networkComputer network
Computer network
 
Firewall
FirewallFirewall
Firewall
 
The internet and online services
The internet and online servicesThe internet and online services
The internet and online services
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network Security
 
Info scince pp
Info scince ppInfo scince pp
Info scince pp
 
Chapter 4 2016
Chapter 4 2016Chapter 4 2016
Chapter 4 2016
 
Lesson 25
Lesson 25Lesson 25
Lesson 25
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Synopsis
SynopsisSynopsis
Synopsis
 

Similar to 2 1 lan

2_1 Local area networks.pptx
2_1 Local area networks.pptx2_1 Local area networks.pptx
2_1 Local area networks.pptxChloeLucas4
 
COM526_Lecture 1.pdf
COM526_Lecture 1.pdfCOM526_Lecture 1.pdf
COM526_Lecture 1.pdfSherefHesham
 
Week 2 network configurartion
Week 2 network configurartionWeek 2 network configurartion
Week 2 network configurartionRobert Almazan
 
What is a network
What is a networkWhat is a network
What is a networkRowan Nave
 
unit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfunit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfshubhangisonawane6
 
Setting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subjectSetting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subjectAnneilynLeal
 
Network & Networking
Network & NetworkingNetwork & Networking
Network & NetworkingGohil Anshu
 
VPN security standards - Tareq Hanaysha
VPN security standards - Tareq HanayshaVPN security standards - Tareq Hanaysha
VPN security standards - Tareq HanayshaHanaysha
 
Networking Basics - Ferdon
Networking Basics - FerdonNetworking Basics - Ferdon
Networking Basics - FerdonSusan Ferdon
 
541ferdon networktutorial
541ferdon networktutorial541ferdon networktutorial
541ferdon networktutorialSusan Ferdon
 
Internet, Intranet and Extranet presentation
Internet, Intranet and Extranet presentationInternet, Intranet and Extranet presentation
Internet, Intranet and Extranet presentationGambari Amosa Isiaka
 
networking concepts
networking conceptsnetworking concepts
networking conceptsmtguillermo
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkammulu99
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorialRodel Morales
 

Similar to 2 1 lan (20)

2_1 Local area networks.pptx
2_1 Local area networks.pptx2_1 Local area networks.pptx
2_1 Local area networks.pptx
 
COM526_Lecture 1.pdf
COM526_Lecture 1.pdfCOM526_Lecture 1.pdf
COM526_Lecture 1.pdf
 
Week 2 network configurartion
Week 2 network configurartionWeek 2 network configurartion
Week 2 network configurartion
 
What is a network
What is a networkWhat is a network
What is a network
 
unit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfunit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdf
 
Chapter 6.0
Chapter 6.0Chapter 6.0
Chapter 6.0
 
Using Network
Using NetworkUsing Network
Using Network
 
Network
NetworkNetwork
Network
 
Setting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subjectSetting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subject
 
Network & Networking
Network & NetworkingNetwork & Networking
Network & Networking
 
VPN security standards - Tareq Hanaysha
VPN security standards - Tareq HanayshaVPN security standards - Tareq Hanaysha
VPN security standards - Tareq Hanaysha
 
Networking Basics - Ferdon
Networking Basics - FerdonNetworking Basics - Ferdon
Networking Basics - Ferdon
 
541ferdon networktutorial
541ferdon networktutorial541ferdon networktutorial
541ferdon networktutorial
 
2010fall ch31 naymka
2010fall ch31 naymka2010fall ch31 naymka
2010fall ch31 naymka
 
Internet, Intranet and Extranet presentation
Internet, Intranet and Extranet presentationInternet, Intranet and Extranet presentation
Internet, Intranet and Extranet presentation
 
networking concepts
networking conceptsnetworking concepts
networking concepts
 
Cn
CnCn
Cn
 
Cnetworks
CnetworksCnetworks
Cnetworks
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of network
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 

Recently uploaded

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Recently uploaded (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

2 1 lan

  • 3. Contents  What is a network?  Basic components of a network  Advantages and disadvantages of a LAN and WLAN  Basic network security  Ethical use of networks  Test and improve your knowledge 3
  • 4. A NETWORK is a collection of computers or other computing devices that are connected by some sort of communication media (either via cable or wirelessly) to allow users to share software, hardware, data and information, and to communicate. What is a network? 4
  • 5. What is a network? LAN  A local area network (LAN) is a network connecting computers in a small area such as a school, university campus or company offices in one building. 5
  • 6. What is a network? LAN A local area network (LAN) • is a network connecting computers in a small area such as a school, university campus or company offices in one building. A wireless LAN (WLAN) • is a LAN which uses wireless (radio waves) to communicate rather than cables. An intranet • is an organisation’s private network and is an Internet- like environment consisting of web pages relating to the organisation’s business. 6
  • 7. Computers and peripherals Workstations desktop compu ters laptops iPads Smart phones Server file server e-mail servers Internet or proxy servers print servers Basic components of a network: Hardware 7
  • 8. Basic components of a network: Hardware Network interface controller allow the computer to communicate with the network built into the motherboard of all computers Switch hardware device used to connect computers in a network so that communication can occur 8
  • 10. Data transmission speed 10 Data transmission speed is the rate at which data is transferred over the media used.  Cabled networks: 10/100/1000 – this refers to the data transmission speed that the NIC can support – 10 Mbps/100Mbps/1000Mbps.  Multiple speeds = max speed depends one type of cabling and equipment used in network. NIC automatically detects and operates at the fastest speed.
  • 11. Data transmission speed 11  Wireless NIC: 802.11 (g or n) – indicates speed that wireless network is capable of.  g = 10Mbps and n = 50Mbps.  Mix of wireless equipment at different speeds = speed is determined by slowest component Data transmission over WLAN is slower than over (cabled) LAN
  • 12. Basic components of a network: Communication media Wired media Cables UTP (Unshielded Twisted Pair) Fibre optic cable Wireless wireless access points wireless enabled / wireless adaptor 12
  • 13. 13 Unshielded Twisted pair VS. Fibre Optic Cable
  • 14. Basic components of a network: Network operating software Software that controls all the communication and security in a network. Most operating systems such as Windows 7.0 have built-in networking capabilities. For larger networks, specialised ‘Server’ editions of the operating system need to be installed on the servers 14
  • 15. How do you know that you are connected to a network?  Presence of extra (logical) drives such as U:, V: and T: which are simply folders on a server that are appearing and acting as drives.  Presence of other computers in My Network Places.  Access to devices such as printers not directly attached to the computer is possible.  Indicator showing network activity in the system tray. 15
  • 16. Advantages and disadvantages of a LAN and WLAN 16
  • 17. Advantages  Files stored on central computer (file server) users access from any computer in the network.  Files transferred easily without the use of devices.  Software shared by many users.  Hardware shared by many users.  Security in the network can be controlled.  A single Internet connection shared by many users.  Software kept up to date using a network.  Software which allows you to demonstrate or broadcast to all the computers in a classroom.  Internet access monitored and controlled. 17
  • 18. Advantages - Wireless  Easy to add or move computers as the network points are not fixed.  Installation easier than with a cabled LAN.  It is easy to provide network connectivity in areas where it is difficult to lay a cable.  Adds mobility for users with mobile devices such as laptops and smartphones. 18
  • 19. Disadvantages  A LAN/WLAN can be expensive to install and maintain.  A network administrator is often necessary to manage the network.  Network security must be maintained to ensure that the data on the network is kept secure.  If the file server is faulty, no one can access their files.  Security can be compromised if the WLAN is not configured correctly to prevent hacking.  Unauthorised users may also make use of your Internet connection- costing money.  Performance can decrease as the number of computers connected increases.  Signal could get lost or interfered with due to electronic or electrical interference. 19
  • 20. Network security refers to policies (rules) put in place to ensure the security of a network by preventing unauthorised access to information and misuse of the computer network. Basic network security • An organisation would not want all their employees to have access to files to do with the salaries of the employees. • In a school situation, it is important that pupils do not have access to tests and exams before they are written or that they are not able to change their term’s results. 20
  • 21. When working in a network environment:  You use a username and password to gain access to the network and its resources.  You will be issued with a username.  Choose a password that will only be known to you.  You will be held responsible for any actions done on the network under your username and password. 21 Example of a ‘good’, secure password: Q1w2E3R4t%y
  • 22. A few rules to follow  Choose password that is at least 8 characters long.  The password should contain a mixture of upper and lowercase letter, numbers and special characters.  You should not use anything else that is easy to guess about you. In fact meaningless passwords are the best.  Be careful of using passwords that follow a pattern on the keyboard such as ‘asdf’ or ‘1234’ as these are also easy to guess.  You should change your password at least every 2 months. 22
  • 23. Whenever people are interacting and sharing resources, there is a need for acceptable, ethical practices. Most organisations, including schools, make use of an acceptable use policy (AUP) to outline the rights and responsibilities of its users, especially in networked environments. Ethical use of networks 23
  • 24. An Acceptable Use Policy (AUP) needs to be frequently updated and is put in place to  clearly list what the users are permitted and not permitted to do in order to protect them when they are using computers and when they are online.  include basic netiquette rules and responsible computer usage, as well as any other restrictions the organisation might feel is necessary to implement such as restrictions related to Internet usage.  serve as a contract between the organisation and the user summarising what they can and can’t do as well as possible consequences of not complying with the policy.  put the duty of using the network in a responsible and ethical way, on the user. 24
  • 25. What should be included in an AUP? (1/2)  A code of conduct with respect to  ethical, legal and safe use  privacy of other users  forms of online communication  restrictions on the amount of data and information downloaded from the Internet  accessing sites with objectionable/offensive material as defined by the laws of the country 25
  • 26. What should be included in an AUP?(2/2)  Details on when and where portable storage devices may be used  Details of restrictions about installing any hardware or software  Procedures to follow if users find they are victims of identity theft, malware such as viruses, cyber bullying or cyber stalking  Hints to avoid plagiarism and the breaking of copyright law  Clear consequences of violating conditions spelt out in the AUP 26
  • 27. Test and improve your knowledge 27
  • 28. Overview of module What is ? Network LAN WLAN Basic components Hardware: • Computers • Peripherals • NIC • Switch Communicati on media: • Wired • Wireless Network operating software Advantages and Disadvantages LAN/WLAN Network security Passwords Ethical use of networks AUP 28
  • 29. Important terms and concepts Intranet Local area network (LAN) Network Network interface controller (NIC) Network operating software Network security Server Switch Wireless local area network (WLAN) 29

Editor's Notes

  1. It is a good idea to show real examples of the different cables.
  2. It is a good idea to show real examples of the different cables.
  3. Purpose of this activity: Testing the knowledge of learners of this module.