22
1 Lesson 24 Network Fundamentals Computer Literacy BASICS: A Comprehensive Guide to IC 3 , 3 rd Edition Morrison / Wells

Computer Literacy Lesson 24

  • Upload
    cpashke

  • View
    278

  • Download
    2

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Computer Literacy Lesson 24

1

Lesson 24Network Fundamentals

Computer Literacy BASICS: A Comprehensive Guide to IC3, 3rd Edition

Morrison / Wells

Page 2: Computer Literacy Lesson 24

Le

sso

n 2

4

Morrison / Wells CLB: A Comp Guide to IC3 3E222

Objectives

Describe a network. Explain the benefits of a network. Identify the risks of network computing. Describe the roles of clients and servers on a network. List and describe the types of networks. List and describe communications media and

hardware. Describe network security.

Page 3: Computer Literacy Lesson 24

Le

sso

n 2

4

Morrison / Wells CLB: A Comp Guide to IC3 3E

Vocabulary

biometric security measures

cable modem client client/server network communication

channels digital subscriber line

(DSL)

extranet firewall hacker hub Internet intranet local area network (LAN) modem

333

Page 4: Computer Literacy Lesson 24

Le

sso

n 2

4

Morrison / Wells CLB: A Comp Guide to IC3 3E

Vocabulary (continued)

node peer-to-peer network proxy server Public Switched

Telephone Network (PSTN)

router server

server operating system T-1 line wide area network (WAN) WiMAX wireless Internet service

provider (WISP) wireless LAN (WLAN)

444

Page 5: Computer Literacy Lesson 24

Le

sso

n 2

4

Morrison / Wells CLB: A Comp Guide to IC3 3E

Introduction

Connecting computers through a network, a group of two or more computers linked together, allows users to share software applications and to share hardware devices such as printers, scanners, and other hardware add-ons.

Companies and organizations use networks to connect employees and subsidiaries nationally and even internationally.

555

Page 6: Computer Literacy Lesson 24

Le

sso

n 2

4

Morrison / Wells CLB: A Comp Guide to IC3 3E

Introducing Networks

The Public Switched Telephone Network (PSTN) supports telephone service and is the world’s collection of interconnected commercial and government-owned voice-oriented systems.

666

Page 7: Computer Literacy Lesson 24

Le

sso

n 2

4

Morrison / Wells CLB: A Comp Guide to IC3 3E

Network Benefits

The biggest network of all is the Internet. Network benefits include:– Information sharing– Collaborative environment– Hardware sharing– Software sharing– Enhanced communications

777

Information sharing

Page 8: Computer Literacy Lesson 24

Le

sso

n 2

4

Morrison / Wells CLB: A Comp Guide to IC3 3E

Risks of Networked Computing

As with any technology, disadvantages also exist. Disadvantages of networks include:– Individual loss of autonomy– Malicious code– Network faults– Setup and management costs– E-mail is not necessarily private

888

Page 9: Computer Literacy Lesson 24

Le

sso

n 2

4

Morrison / Wells CLB: A Comp Guide to IC3 3E

Client/Server Networks

The term client/server network describes a software architectural model relationship.

In most instances, the client is a software program such as Internet Explorer. The server is hardware and can be one of many types of servers, such as a mail server, a database server, an FTP server, an application server, or a Web server.

Server operating systems are high-end programs designed to provide network control and include special functions for connecting computers and other devices into a network.

999

Page 10: Computer Literacy Lesson 24

Le

sso

n 2

4

Morrison / Wells CLB: A Comp Guide to IC3 3E

Network Types

Networks are divided into two main types: local area networks (LANs) and wide area networks (WANs).

101010

Page 11: Computer Literacy Lesson 24

Le

sso

n 2

4

Morrison / Wells CLB: A Comp Guide to IC3 3E

Local Area Networks: Most LANs connect

personal computers, workstations, and other devices such as printers and scanners in a limited geographical area.

Network Types (continued)

11

Wireless LAN

Page 12: Computer Literacy Lesson 24

Le

sso

n 2

4

Morrison / Wells CLB: A Comp Guide to IC3 3E

Network Types (continued)

Wide Area Networks: A WAN covers a large geographical area and can contain

communication links across metropolitan, regional, or national boundaries.

Network types include:– Client/server network: Server manages resources– Peer-to-peer network: All computers are equal– Intranet: Used within an organization– Extranet: Specific outside users can access– Internet: Global network allows worldwide connection

121212

Page 13: Computer Literacy Lesson 24

Le

sso

n 2

4

Morrison / Wells CLB: A Comp Guide to IC3 3E

Network Communications

Communication Hardware: Communication hardware devices facilitate the

transmitting and receiving of data. Examples are:– Modem: Converts analog signals to digital and vice

versa– Cable modem: Uses coaxial cable– Digital subscriber line: Uses ordinary phone lines– T-1: Type of fiber-optic telephone line– Wireless: Delivers fast connection speeds

131313

Page 14: Computer Literacy Lesson 24

Le

sso

n 2

4

Morrison / Wells CLB: A Comp Guide to IC3 3E

Network Security Issues

Passwords are the most common form of restricting access to data.

141414

Establishing and maintaining computer security is necessary to keep hardware, software, and data safe from harm or destruction.

Page 15: Computer Literacy Lesson 24

Le

sso

n 2

4

Morrison / Wells CLB: A Comp Guide to IC3 3E

Network Security Issues (continued)

Other security measures include:– Electronic identification cards– Firewalls to protect companies’ networks from

external networks– Antivirus software– A proxy server that acts as an intermediary

between a user and the Internet.

151515

Page 16: Computer Literacy Lesson 24

Le

sso

n 2

4

Morrison / Wells CLB: A Comp Guide to IC3 3E

Network Security Issues (continued)

Planning for Security: Companies must plan for security before it is

needed– Institute a selective hiring process.– Regularly back up data and store it off site.– Employ biometric security measures.

161616

Page 17: Computer Literacy Lesson 24

Le

sso

n 2

4

Morrison / Wells CLB: A Comp Guide to IC3 3E

Network Security Issues (continued)

Wireless Security: Wireless networking

is very common, but has many security issues and hackers have found it very easy to access wireless networks.

171717

Page 18: Computer Literacy Lesson 24

Le

sso

n 2

4

Morrison / Wells CLB: A Comp Guide to IC3 3E1818

Summary

In this lesson, you learned: A network is a group of two or more computers

linked together. A telephone network is similar in makeup to a

computer network. The Public Switched Telephone Network (PSTN) supports telephone service, and it is the world’s largest collection of interconnected commercial and government-owned voice-oriented systems.

18

Page 19: Computer Literacy Lesson 24

Le

sso

n 2

4

Morrison / Wells CLB: A Comp Guide to IC3 3E1919

Summary (continued)

You can use a network for information sharing, hardware sharing, software sharing, and as a collaborative environment.

Networks are divided into two main types: local area networks and wide area networks.

Local area networks (LANs) connect personal computers, workstations, and other devices such as printers and scanners in a limited geographical area, such as an office building, a school, or a home.

19

Page 20: Computer Literacy Lesson 24

Le

sso

n 2

4

Morrison / Wells CLB: A Comp Guide to IC3 3E2020

Summary (continued)

A wide area network (WAN) is made up of several connected local area networks.

In a client/server network, one or more computers on the network act as a server. The server manages network resources. In a peer-to-peer network, all of the computers are equal. No computer is designated as the server. People on the network each determine what files on their computer they share with others on the network.

20

Page 21: Computer Literacy Lesson 24

Le

sso

n 2

4

Morrison / Wells CLB: A Comp Guide to IC3 3E2121

Summary (continued)

Data security is a risk with many networks. Some risks to computers are natural causes, some are accidents, and others are intentional.

The best way to protect data is to effectively control the access to it. Generally, this protection is the responsibility of the network administrators and security personnel. If unauthorized persons gain access to data, they may obtain valuable information or trade secrets. Hackers are people who break into computer systems to steal services and information.

21

Page 22: Computer Literacy Lesson 24

Le

sso

n 2

4

Morrison / Wells CLB: A Comp Guide to IC3 3E2222

Summary (continued)

Transmission media can be either physical or wireless.

A modem is a type of communication device. A hub is a device that controls the incoming and forwarding of data. A router directs traffic on the Internet or on multiple connected networks.

22