SlideShare a Scribd company logo
1 of 21
Lesson 25
Network Fundamentals
Computer Literacy
BASICS: A
Comprehensive Guide
to IC3, 4th Edition

1

Morrison / Wells
Objectives



Lesson 25







2

Describe a network.
Identify the benefits of a network.
Evaluate the risks of network computing.
Identify client/server networks.
Identify network types.
Understand network communications.
Resolve network security issues.

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Vocabulary


Lesson 25








3

biometric security
measure
cable modem
client
client/server
network
communications
channels

Morrison / Wells










digital subscriber
line (DSL)
extranet
firewall
hacker
hub
Internet
CLB: A Comp Guide to IC3 4E
Vocabulary (continued)


Lesson 25








4

intranet
local area network
(LAN)
modem
node
peer-to-peer (P2P)
network
proxy server

Morrison / Wells







Public Switched
Telephone Network
(PSTN)
router
server
server operating
system
CLB: A Comp Guide to IC3 4E
Vocabulary (continued)


Lesson 25








5

T-1 line
wide area network
(WAN)
WiMAX
wireless Internet
service provider
(WISP)

Morrison / Wells



wireless LAN
(WLAN)

CLB: A Comp Guide to IC3 4E
Introducing Networks

Lesson 25



6



A network is simply a
group of two or more
computers linked
together.
Digital, mobile, and
standard telephones are
supported through the
Public Switched
Telephone Network
(PSTN).

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Identifying the Benefits of a
Network


A network like the Internet provides instant
communication. Other benefits include:
–

Lesson 25

–

7

–
–
–

Information sharing
Collaborative environment
Hardware sharing
Software sharing
Enhanced communication

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Evaluating the Risks of Networked
Computing

Lesson 25



8



The security of a computer network is
challenged every day by equipment
malfunctions, system failures, computer
hackers, and virus attacks.
Equipment malfunctions and system failures
can be caused by natural disasters such as
floods or storms, fires, and electrical
disturbances such as brownouts or blackouts.

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Evaluating the Risks of Networked
Computing (continued)


Other disadvantages of networks include:
–

Lesson 25

–

9

–
–
–

Individual loss of autonomy
Malicious code
Network faults
Setup and management costs
Lack of privacy

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Identifying Client/Server Networks


Lesson 25



10





The term client/server network describes a network
design model.
In most instances, the client is a software program such
as Internet Explorer.
The server is hardware (a computer) and can be one of
many types, such as a mail server, a database server, an
FTP server, an application server, or a Web server.
Server operating systems are high-end programs
designed to provide network control and include special
functions for connecting computers and other devices into
a network.

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Identifying Network Types


Lesson 25



11

Local Area Networks:
Most LANs connect
personal computers,
workstations, and other
devices such as printers
and scanners in a
limited geographical
area, such as an office
building, school, or
home.

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Identifying Network Types
(continued)


Lesson 25





Wide Area Networks (WAN):
A WAN covers a large geographical area and can
contain communication links across metropolitan,
regional, or national boundaries.
Other Types of Networks
–
–
–
–
–

12

Client/server network
Peer-to-peer network
Intranet
Extranet
Internet

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Understanding Network
Communications


Communication Hardware:
–

Lesson 25

–

13

–
–
–

Modem
Cable modem
Digital subscriber line
T-1 line
Wireless

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Resolving Network Security Issues

Lesson 25



14

The most common
form of restricting
access to data is
the use of
passwords, which
are similar to
combinations you
need to remove a
lock.

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Resolving Network Security Issues
(continued)


Other security measures include:
–
–

Lesson 25

–
–




Planning for Security:
Guidelines include:
–
–
–

15

Electronic identification cards
Firewalls
Antivirus software
Proxy server

Selective hiring process
Regular data backup
Biometric security measures

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Resolving Network Security Issues
(continued)


Lesson 25



16

Wireless Security:
Wireless networking
has many security
issues and hackers
have found it easy
to access wireless
networks.

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Summary
In this lesson, you learned:

Lesson 25



17



A network is a group of two or more computers
linked together.
A telephone network is similar in makeup to a
computer network. The Public Switched
Telephone Network (PSTN) supports telephone
service, and it is the world’s largest collection of
interconnected commercial and governmentowned voice-oriented systems.

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Summary (continued)


Lesson 25



18



You can use a network for information sharing,
hardware sharing, software sharing, and as a
collaborative environment.
Networks are categorized according to size as local
area networks (LANs) and wide area networks
(WANs).
LANs connect personal computers, workstations,
and other devices such as printers and scanners in a
limited geographical area, such as an office building,
a school, or a home.

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Summary (continued)


Lesson 25



19

A WAN is made up of several connected local area
networks.
In a client/server network, one or more computers on
the network acts as a server. The server manages
network resources. In a peer-to-peer (P2P) network,
all of the computers are equal. No computer is
designated as the server. People on the network
each determine what files on their computer they
share with others on the network.

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Summary (continued)


Lesson 25



20

Data insecurity is a risk with many networks. Some
risks to computers are natural causes, some are
accidents, and others are intentional.
The best way to protect data is to effectively control
the access to it. Generally, this protection is the
responsibility of the network administrators and
security personnel. If unauthorized persons gain
access to data, they may obtain valuable information
or trade secrets. Hackers are people who break into
computer systems to steal services and information.

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Summary (continued)


Lesson 25



21

Transmission media can be either physical or
wireless.
A modem is a type of communications
device. A hub is a device that controls the
incoming and forwarding of data. A router
directs traffic on the Internet or on multiple
connected networks.

Morrison / Wells

CLB: A Comp Guide to IC3 4E

More Related Content

What's hot

Computer Network ASsignment
Computer Network ASsignmentComputer Network ASsignment
Computer Network ASsignmentBijay Bista
 
La3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networksLa3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networksKak Yong
 
Learning assignment (computer Networking)
Learning assignment (computer Networking)Learning assignment (computer Networking)
Learning assignment (computer Networking)Mehar Arslan
 
Presentation3 network
Presentation3 networkPresentation3 network
Presentation3 networkRana Muzffar
 
Computer network
Computer networkComputer network
Computer networkHazratAli82
 
Networking online assignment
Networking online assignmentNetworking online assignment
Networking online assignmentKavitha Dhanesh
 
IT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for MidtermIT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for MidtermMark John Lado, MIT
 
Module1 introduction to network
Module1 introduction to networkModule1 introduction to network
Module1 introduction to networkMiz Malinz
 
NETWORK COMMUNICATION TECHNOLOGY
NETWORK COMMUNICATION TECHNOLOGYNETWORK COMMUNICATION TECHNOLOGY
NETWORK COMMUNICATION TECHNOLOGYKak Yong
 
PST SC015 Chapter 3 Internet Technology (II) 2017/2018
PST SC015 Chapter 3 Internet Technology (II)  2017/2018PST SC015 Chapter 3 Internet Technology (II)  2017/2018
PST SC015 Chapter 3 Internet Technology (II) 2017/2018Fizaril Amzari Omar
 
NETWORK INTERNET and TYPES OF NETWORK
NETWORK INTERNET and TYPES OF NETWORKNETWORK INTERNET and TYPES OF NETWORK
NETWORK INTERNET and TYPES OF NETWORKimtiazalijoono
 
Input and Output Devices worksheet
Input and Output Devices worksheetInput and Output Devices worksheet
Input and Output Devices worksheetmasharks
 
Computer Networking Basic
Computer Networking BasicComputer Networking Basic
Computer Networking BasicFaraz Ahmed
 
Basic concept of Computer networks
Basic concept of Computer networks Basic concept of Computer networks
Basic concept of Computer networks ShohanaakterKakon
 

What's hot (20)

network
networknetwork
network
 
Computer Network ASsignment
Computer Network ASsignmentComputer Network ASsignment
Computer Network ASsignment
 
La3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networksLa3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networks
 
Learning assignment (computer Networking)
Learning assignment (computer Networking)Learning assignment (computer Networking)
Learning assignment (computer Networking)
 
Presentation3 network
Presentation3 networkPresentation3 network
Presentation3 network
 
Computer network
Computer networkComputer network
Computer network
 
Computer networks
Computer networksComputer networks
Computer networks
 
Networking online assignment
Networking online assignmentNetworking online assignment
Networking online assignment
 
IT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for MidtermIT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for Midterm
 
Module1 introduction to network
Module1 introduction to networkModule1 introduction to network
Module1 introduction to network
 
NETWORK COMMUNICATION TECHNOLOGY
NETWORK COMMUNICATION TECHNOLOGYNETWORK COMMUNICATION TECHNOLOGY
NETWORK COMMUNICATION TECHNOLOGY
 
Network Basics
Network BasicsNetwork Basics
Network Basics
 
PST SC015 Chapter 3 Internet Technology (II) 2017/2018
PST SC015 Chapter 3 Internet Technology (II)  2017/2018PST SC015 Chapter 3 Internet Technology (II)  2017/2018
PST SC015 Chapter 3 Internet Technology (II) 2017/2018
 
NETWORK INTERNET and TYPES OF NETWORK
NETWORK INTERNET and TYPES OF NETWORKNETWORK INTERNET and TYPES OF NETWORK
NETWORK INTERNET and TYPES OF NETWORK
 
Input and Output Devices worksheet
Input and Output Devices worksheetInput and Output Devices worksheet
Input and Output Devices worksheet
 
2 1 lan
2 1 lan2 1 lan
2 1 lan
 
Networking
NetworkingNetworking
Networking
 
Computer Networking Basic
Computer Networking BasicComputer Networking Basic
Computer Networking Basic
 
Bab3
Bab3Bab3
Bab3
 
Basic concept of Computer networks
Basic concept of Computer networks Basic concept of Computer networks
Basic concept of Computer networks
 

Viewers also liked

Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentalsBesar Limani
 
Computer Literacy Lesson 8
Computer Literacy Lesson 8Computer Literacy Lesson 8
Computer Literacy Lesson 8cpashke
 
Computer Literacy Lesson 15
Computer Literacy Lesson 15Computer Literacy Lesson 15
Computer Literacy Lesson 15cpashke
 
Computer Literacy Lesson 3
Computer Literacy Lesson 3Computer Literacy Lesson 3
Computer Literacy Lesson 3cpashke
 
Computer Literacy Lesson 9
Computer Literacy Lesson 9Computer Literacy Lesson 9
Computer Literacy Lesson 9cpashke
 
Computer Literacy Lesson 6
Computer Literacy Lesson 6Computer Literacy Lesson 6
Computer Literacy Lesson 6cpashke
 
Computer Literacy Lesson 4
Computer Literacy Lesson 4Computer Literacy Lesson 4
Computer Literacy Lesson 4cpashke
 
Computer Literacy Lesson Two
Computer Literacy Lesson TwoComputer Literacy Lesson Two
Computer Literacy Lesson Twocpashke
 
Computer Literacy Lesson 13
Computer Literacy Lesson 13Computer Literacy Lesson 13
Computer Literacy Lesson 13cpashke
 
Computer Literacy Lesson 14
Computer Literacy Lesson 14Computer Literacy Lesson 14
Computer Literacy Lesson 14cpashke
 
Computer Literacy Lesson 5
Computer Literacy Lesson 5Computer Literacy Lesson 5
Computer Literacy Lesson 5cpashke
 
Computer Literacy Lesson 11
Computer Literacy Lesson 11Computer Literacy Lesson 11
Computer Literacy Lesson 11cpashke
 
Computer Literacy Lesson 12
Computer Literacy Lesson 12Computer Literacy Lesson 12
Computer Literacy Lesson 12cpashke
 
Computer Literacy Lesson 10
Computer Literacy Lesson 10Computer Literacy Lesson 10
Computer Literacy Lesson 10cpashke
 
Computer Literacy Lesson 16
Computer Literacy Lesson 16Computer Literacy Lesson 16
Computer Literacy Lesson 16cpashke
 
Computer Literacy Lesson 7
Computer Literacy Lesson 7Computer Literacy Lesson 7
Computer Literacy Lesson 7cpashke
 
Computer Literacy Lesson 1: Computer and Operating Systems
Computer Literacy Lesson 1: Computer and Operating SystemsComputer Literacy Lesson 1: Computer and Operating Systems
Computer Literacy Lesson 1: Computer and Operating Systemscpashke
 
FUNDAMENTALS OF COMPUTER
FUNDAMENTALS OF COMPUTERFUNDAMENTALS OF COMPUTER
FUNDAMENTALS OF COMPUTERthanathip
 

Viewers also liked (20)

Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentals
 
Computer Literacy Lesson 8
Computer Literacy Lesson 8Computer Literacy Lesson 8
Computer Literacy Lesson 8
 
Computer Literacy Lesson 15
Computer Literacy Lesson 15Computer Literacy Lesson 15
Computer Literacy Lesson 15
 
Computer Literacy Lesson 3
Computer Literacy Lesson 3Computer Literacy Lesson 3
Computer Literacy Lesson 3
 
Computer Literacy Lesson 9
Computer Literacy Lesson 9Computer Literacy Lesson 9
Computer Literacy Lesson 9
 
Computer Literacy Lesson 6
Computer Literacy Lesson 6Computer Literacy Lesson 6
Computer Literacy Lesson 6
 
Computer Literacy Lesson 4
Computer Literacy Lesson 4Computer Literacy Lesson 4
Computer Literacy Lesson 4
 
Computer Literacy Lesson Two
Computer Literacy Lesson TwoComputer Literacy Lesson Two
Computer Literacy Lesson Two
 
Computer Literacy Lesson 13
Computer Literacy Lesson 13Computer Literacy Lesson 13
Computer Literacy Lesson 13
 
Computer Literacy Lesson 14
Computer Literacy Lesson 14Computer Literacy Lesson 14
Computer Literacy Lesson 14
 
Computer Literacy Lesson 5
Computer Literacy Lesson 5Computer Literacy Lesson 5
Computer Literacy Lesson 5
 
Computer Literacy Lesson 11
Computer Literacy Lesson 11Computer Literacy Lesson 11
Computer Literacy Lesson 11
 
Computer Literacy Lesson 12
Computer Literacy Lesson 12Computer Literacy Lesson 12
Computer Literacy Lesson 12
 
Computer Literacy Lesson 10
Computer Literacy Lesson 10Computer Literacy Lesson 10
Computer Literacy Lesson 10
 
Computer Literacy Lesson 16
Computer Literacy Lesson 16Computer Literacy Lesson 16
Computer Literacy Lesson 16
 
Computer Literacy Lesson 7
Computer Literacy Lesson 7Computer Literacy Lesson 7
Computer Literacy Lesson 7
 
Computer Literacy Lesson 1: Computer and Operating Systems
Computer Literacy Lesson 1: Computer and Operating SystemsComputer Literacy Lesson 1: Computer and Operating Systems
Computer Literacy Lesson 1: Computer and Operating Systems
 
3.1.2 classification of network
3.1.2 classification of network3.1.2 classification of network
3.1.2 classification of network
 
FUNDAMENTALS OF COMPUTER
FUNDAMENTALS OF COMPUTERFUNDAMENTALS OF COMPUTER
FUNDAMENTALS OF COMPUTER
 
Computer fundamental
Computer fundamentalComputer fundamental
Computer fundamental
 

Similar to Lesson 25

COMPUTER NETWORKING (1).pdf
COMPUTER NETWORKING (1).pdfCOMPUTER NETWORKING (1).pdf
COMPUTER NETWORKING (1).pdfBeulahJayarani
 
COM526_Lecture 1.pdf
COM526_Lecture 1.pdfCOM526_Lecture 1.pdf
COM526_Lecture 1.pdfSherefHesham
 
Computer networking xii
Computer networking  xiiComputer networking  xii
Computer networking xiisaltyp
 
Computer Network its application & network types
Computer Network its application & network typesComputer Network its application & network types
Computer Network its application & network typesMolayChakraBorty
 
Wireless Deauth and Disassociation Attacks explained
Wireless Deauth and Disassociation Attacks explainedWireless Deauth and Disassociation Attacks explained
Wireless Deauth and Disassociation Attacks explainedDavid Sweigert
 
Chapter 4 computer network and the internet2
Chapter 4 computer network and the internet2Chapter 4 computer network and the internet2
Chapter 4 computer network and the internet2Melaku Bayih Demessie
 
Computer network
Computer networkComputer network
Computer networkHazratAli82
 
Install network cable module CSS NC2
Install network cable module CSS NC2Install network cable module CSS NC2
Install network cable module CSS NC2wilfredo dela cerna
 
6.Copyright © 2016 Pearson Education, Inc. publishing as .docx
6.Copyright © 2016 Pearson Education, Inc. publishing as .docx6.Copyright © 2016 Pearson Education, Inc. publishing as .docx
6.Copyright © 2016 Pearson Education, Inc. publishing as .docxalinainglis
 
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...IJCSIS Research Publications
 
What is Computer Network? Types of computer network, LAN, MAN, WAN
What is Computer Network? Types of computer network, LAN, MAN, WANWhat is Computer Network? Types of computer network, LAN, MAN, WAN
What is Computer Network? Types of computer network, LAN, MAN, WANA. S. M. Shafi
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 

Similar to Lesson 25 (20)

COMPUTER NETWORKING (1).pdf
COMPUTER NETWORKING (1).pdfCOMPUTER NETWORKING (1).pdf
COMPUTER NETWORKING (1).pdf
 
COM526_Lecture 1.pdf
COM526_Lecture 1.pdfCOM526_Lecture 1.pdf
COM526_Lecture 1.pdf
 
Computer network 1
Computer network 1Computer network 1
Computer network 1
 
Computer networks
Computer networksComputer networks
Computer networks
 
Computer networking xii
Computer networking  xiiComputer networking  xii
Computer networking xii
 
niceData com.
niceData com.niceData com.
niceData com.
 
niceData com.
niceData com.niceData com.
niceData com.
 
basic network concepts
basic network conceptsbasic network concepts
basic network concepts
 
Computer Network its application & network types
Computer Network its application & network typesComputer Network its application & network types
Computer Network its application & network types
 
Wireless Deauth and Disassociation Attacks explained
Wireless Deauth and Disassociation Attacks explainedWireless Deauth and Disassociation Attacks explained
Wireless Deauth and Disassociation Attacks explained
 
Chapter 4 computer network and the internet2
Chapter 4 computer network and the internet2Chapter 4 computer network and the internet2
Chapter 4 computer network and the internet2
 
Computer network
Computer networkComputer network
Computer network
 
Install network cable module CSS NC2
Install network cable module CSS NC2Install network cable module CSS NC2
Install network cable module CSS NC2
 
NET.pptx
NET.pptxNET.pptx
NET.pptx
 
6.Copyright © 2016 Pearson Education, Inc. publishing as .docx
6.Copyright © 2016 Pearson Education, Inc. publishing as .docx6.Copyright © 2016 Pearson Education, Inc. publishing as .docx
6.Copyright © 2016 Pearson Education, Inc. publishing as .docx
 
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...
 
Introduction to computer_lec_05
Introduction to computer_lec_05Introduction to computer_lec_05
Introduction to computer_lec_05
 
Chapter 05
Chapter 05Chapter 05
Chapter 05
 
What is Computer Network? Types of computer network, LAN, MAN, WAN
What is Computer Network? Types of computer network, LAN, MAN, WANWhat is Computer Network? Types of computer network, LAN, MAN, WAN
What is Computer Network? Types of computer network, LAN, MAN, WAN
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 

More from Tracie King

The career search project
The career search projectThe career search project
The career search projectTracie King
 
The career search project word
The career search project wordThe career search project word
The career search project wordTracie King
 
Roles and Responsibilities: Developing the Team
Roles and Responsibilities: Developing the TeamRoles and Responsibilities: Developing the Team
Roles and Responsibilities: Developing the TeamTracie King
 
Interface: Creating the connection
Interface: Creating the connectionInterface: Creating the connection
Interface: Creating the connectionTracie King
 
Gameplay: Creating the Experience
Gameplay:  Creating the ExperienceGameplay:  Creating the Experience
Gameplay: Creating the ExperienceTracie King
 
Game Story and Character Development
Game Story and Character DevelopmentGame Story and Character Development
Game Story and Character DevelopmentTracie King
 
Production and Management: Developing the Process
Production and Management: Developing the ProcessProduction and Management: Developing the Process
Production and Management: Developing the ProcessTracie King
 
98 374 Lesson 02-slides
98 374 Lesson 02-slides98 374 Lesson 02-slides
98 374 Lesson 02-slidesTracie King
 
98 374 Lesson 01-slides
98 374 Lesson 01-slides98 374 Lesson 01-slides
98 374 Lesson 01-slidesTracie King
 
98 374 Lesson 06-slides
98 374 Lesson 06-slides98 374 Lesson 06-slides
98 374 Lesson 06-slidesTracie King
 
98 374 Lesson 05-slides
98 374 Lesson 05-slides98 374 Lesson 05-slides
98 374 Lesson 05-slidesTracie King
 
98 374 Lesson 04-slides
98 374 Lesson 04-slides98 374 Lesson 04-slides
98 374 Lesson 04-slidesTracie King
 
98 374 Lesson 03-slides
98 374 Lesson 03-slides98 374 Lesson 03-slides
98 374 Lesson 03-slidesTracie King
 

More from Tracie King (20)

The career search project
The career search projectThe career search project
The career search project
 
The career search project word
The career search project wordThe career search project word
The career search project word
 
Roles and Responsibilities: Developing the Team
Roles and Responsibilities: Developing the TeamRoles and Responsibilities: Developing the Team
Roles and Responsibilities: Developing the Team
 
Interface: Creating the connection
Interface: Creating the connectionInterface: Creating the connection
Interface: Creating the connection
 
Gameplay: Creating the Experience
Gameplay:  Creating the ExperienceGameplay:  Creating the Experience
Gameplay: Creating the Experience
 
Game Story and Character Development
Game Story and Character DevelopmentGame Story and Character Development
Game Story and Character Development
 
Production and Management: Developing the Process
Production and Management: Developing the ProcessProduction and Management: Developing the Process
Production and Management: Developing the Process
 
98 374 Lesson 02-slides
98 374 Lesson 02-slides98 374 Lesson 02-slides
98 374 Lesson 02-slides
 
98 374 Lesson 01-slides
98 374 Lesson 01-slides98 374 Lesson 01-slides
98 374 Lesson 01-slides
 
98 374 Lesson 06-slides
98 374 Lesson 06-slides98 374 Lesson 06-slides
98 374 Lesson 06-slides
 
98 374 Lesson 05-slides
98 374 Lesson 05-slides98 374 Lesson 05-slides
98 374 Lesson 05-slides
 
98 374 Lesson 04-slides
98 374 Lesson 04-slides98 374 Lesson 04-slides
98 374 Lesson 04-slides
 
98 374 Lesson 03-slides
98 374 Lesson 03-slides98 374 Lesson 03-slides
98 374 Lesson 03-slides
 
Max2015 ch01
Max2015 ch01Max2015 ch01
Max2015 ch01
 
Max2015 ch03
Max2015 ch03Max2015 ch03
Max2015 ch03
 
Max2015 ch02
Max2015 ch02Max2015 ch02
Max2015 ch02
 
Max2015 ch05
Max2015 ch05Max2015 ch05
Max2015 ch05
 
Max2015 ch04
Max2015 ch04Max2015 ch04
Max2015 ch04
 
Max2015 ch06
Max2015 ch06Max2015 ch06
Max2015 ch06
 
Max2015 ch07
Max2015 ch07Max2015 ch07
Max2015 ch07
 

Recently uploaded

_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 

Recently uploaded (20)

_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 

Lesson 25

  • 1. Lesson 25 Network Fundamentals Computer Literacy BASICS: A Comprehensive Guide to IC3, 4th Edition 1 Morrison / Wells
  • 2. Objectives   Lesson 25      2 Describe a network. Identify the benefits of a network. Evaluate the risks of network computing. Identify client/server networks. Identify network types. Understand network communications. Resolve network security issues. Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 3. Vocabulary  Lesson 25     3 biometric security measure cable modem client client/server network communications channels Morrison / Wells       digital subscriber line (DSL) extranet firewall hacker hub Internet CLB: A Comp Guide to IC3 4E
  • 4. Vocabulary (continued)  Lesson 25      4 intranet local area network (LAN) modem node peer-to-peer (P2P) network proxy server Morrison / Wells     Public Switched Telephone Network (PSTN) router server server operating system CLB: A Comp Guide to IC3 4E
  • 5. Vocabulary (continued)  Lesson 25     5 T-1 line wide area network (WAN) WiMAX wireless Internet service provider (WISP) Morrison / Wells  wireless LAN (WLAN) CLB: A Comp Guide to IC3 4E
  • 6. Introducing Networks Lesson 25  6  A network is simply a group of two or more computers linked together. Digital, mobile, and standard telephones are supported through the Public Switched Telephone Network (PSTN). Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 7. Identifying the Benefits of a Network  A network like the Internet provides instant communication. Other benefits include: – Lesson 25 – 7 – – – Information sharing Collaborative environment Hardware sharing Software sharing Enhanced communication Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 8. Evaluating the Risks of Networked Computing Lesson 25  8  The security of a computer network is challenged every day by equipment malfunctions, system failures, computer hackers, and virus attacks. Equipment malfunctions and system failures can be caused by natural disasters such as floods or storms, fires, and electrical disturbances such as brownouts or blackouts. Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 9. Evaluating the Risks of Networked Computing (continued)  Other disadvantages of networks include: – Lesson 25 – 9 – – – Individual loss of autonomy Malicious code Network faults Setup and management costs Lack of privacy Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 10. Identifying Client/Server Networks  Lesson 25  10   The term client/server network describes a network design model. In most instances, the client is a software program such as Internet Explorer. The server is hardware (a computer) and can be one of many types, such as a mail server, a database server, an FTP server, an application server, or a Web server. Server operating systems are high-end programs designed to provide network control and include special functions for connecting computers and other devices into a network. Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 11. Identifying Network Types  Lesson 25  11 Local Area Networks: Most LANs connect personal computers, workstations, and other devices such as printers and scanners in a limited geographical area, such as an office building, school, or home. Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 12. Identifying Network Types (continued)  Lesson 25   Wide Area Networks (WAN): A WAN covers a large geographical area and can contain communication links across metropolitan, regional, or national boundaries. Other Types of Networks – – – – – 12 Client/server network Peer-to-peer network Intranet Extranet Internet Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 13. Understanding Network Communications  Communication Hardware: – Lesson 25 – 13 – – – Modem Cable modem Digital subscriber line T-1 line Wireless Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 14. Resolving Network Security Issues Lesson 25  14 The most common form of restricting access to data is the use of passwords, which are similar to combinations you need to remove a lock. Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 15. Resolving Network Security Issues (continued)  Other security measures include: – – Lesson 25 – –   Planning for Security: Guidelines include: – – – 15 Electronic identification cards Firewalls Antivirus software Proxy server Selective hiring process Regular data backup Biometric security measures Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 16. Resolving Network Security Issues (continued)  Lesson 25  16 Wireless Security: Wireless networking has many security issues and hackers have found it easy to access wireless networks. Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 17. Summary In this lesson, you learned: Lesson 25  17  A network is a group of two or more computers linked together. A telephone network is similar in makeup to a computer network. The Public Switched Telephone Network (PSTN) supports telephone service, and it is the world’s largest collection of interconnected commercial and governmentowned voice-oriented systems. Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 18. Summary (continued)  Lesson 25  18  You can use a network for information sharing, hardware sharing, software sharing, and as a collaborative environment. Networks are categorized according to size as local area networks (LANs) and wide area networks (WANs). LANs connect personal computers, workstations, and other devices such as printers and scanners in a limited geographical area, such as an office building, a school, or a home. Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 19. Summary (continued)  Lesson 25  19 A WAN is made up of several connected local area networks. In a client/server network, one or more computers on the network acts as a server. The server manages network resources. In a peer-to-peer (P2P) network, all of the computers are equal. No computer is designated as the server. People on the network each determine what files on their computer they share with others on the network. Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 20. Summary (continued)  Lesson 25  20 Data insecurity is a risk with many networks. Some risks to computers are natural causes, some are accidents, and others are intentional. The best way to protect data is to effectively control the access to it. Generally, this protection is the responsibility of the network administrators and security personnel. If unauthorized persons gain access to data, they may obtain valuable information or trade secrets. Hackers are people who break into computer systems to steal services and information. Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 21. Summary (continued)  Lesson 25  21 Transmission media can be either physical or wireless. A modem is a type of communications device. A hub is a device that controls the incoming and forwarding of data. A router directs traffic on the Internet or on multiple connected networks. Morrison / Wells CLB: A Comp Guide to IC3 4E