Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

N5 Computer Networking

Not yet finished National 5 Computer Networking. Feel free to use, distribute, edit, copy etc.
by

Ryan Fisher

on 12 November 2015

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of N5 Computer Networking

Computer Networking
Types of Network
ISDD - Networking
What is a Network?
LAN
LAN/WAN
The difference between a Local Area Network (LAN)
and a Wide Area Network (WAN)
Types of Connectivity
LAN
Client/Server
The Internet
Comparison
Computers can be Networked
A Computer can be standalone without connecting to or communicating with any other computer.
Create Documents
Single Player
Games
Play DVDs
Local Area Network (LAN)
In the House
In the Workplace
Advantages of LAN
Share Data
Share Devices
Email
Security
Login on any PC
Disadvantages of LAN
Can be Expensive
Viruses can Spread
Licenses
Exercise
Today...
Before Networking all Computers were Standalone
Security Risks
Risks to network security and steps you can take to avoid them.
Internet
Open the exercise sheet on Pupil Shared.
National 5
R Fisher
WAN
Today...
Wide Area Network (WAN)
Companies can distribute their network all over the world with one management structure.
Wired
Cat5e Twisted Pair
Coaxial
Fibre Optic
Extremely Fast 100 Terabytes per Second Possible
Difficult to intercept data (secure)
Expensive to install
Usually only for high demand links
Becoming more available at home
Physical Connectivity (LAN)
Wireless
Infrared communication
Used for wireless mouse and keyboard
Bluetooth
Range of about 10 metres
WIFI (Wireless Fidelity Alliance)
Range of about 12-50 metres
All use Radio Waves
1. Name 2 types of cable used in a network.

2. What type of cable does the school have on its LAN?

3. How can you link up the computers at home without using cables?
Not as common now but still used
Used in most networks
Questions
Types of Media &
Client / Server
Standard Computer
Connected to the Network
Usually inexpensive
Client
Server
Server Provides Resources for Clients
Printer Server - Manages print queues
File Server* - Sharing of collection of files
Proxy Server - Sharing of internet connection
Web Server - Share web sites
Database Server - Stores and allows access to databases
Countless Others
Computing's Answer to Ferrari
Usually very expensive
Very powerful
Can respond much quicker than a normal system.
Why use a Server?
Organise Security for Whole Network
Backups of whole network
User accounts centralised and more controllable from one system (the server)
Before understanding
WAN it may
be useful to
consider servers
LAN
LAN
LAN
LAN
LAN
LAN
LAN
Peer-to-Peer vs Client/Server
Physical Connectivity (WAN)
Phone Lines
Fibre Optic
Satellite
Usually a mixture!
The Internet is a massive WAN
Slower than a LAN because of cabling and distance - But getting faster thanks to Fibre Optic becoming more common!
Advantages of WAN
Social Networking
World wide Email
World Wide Web
World wide File Transfer
World Wide!
ecommerce
Video Conferencing
Multiple LANs linked together to form a WAN
Disadvantages of WAN
Widespread Viruses
"Phishing"
Next Lesson we will look more in-depth at these threats plus more
LAN/WAN
WAN Threats
Spyware
Gathers personal data and forwards it without consent
Key Logging
Detects key presses and seeks out patterns (commonly typed passwords, credit cards, names etc.)
Phishing
Deceiving the user into thinking that they are on another website to obtain sensitive information (credit card details, logins)
Denial of Service Attack
YOUTUBE VIDEO
Internet Fraud
Deception of internet users in order to take advantage of them, usually financial gain.
Identity Theft
Pretending to be somebody else using stolen details for personal gain.
Security Risks
Task 3
Learning Intentions
I can describe Internet Fraud, specifically:
Spyware
Key Logging
DOS Attack
Identity Theft
Phishing
Success Criteria
I have a completed worksheet which shows my understanding of:
Noteworthy Cyber Attacks and how they worked.
Common methods used to obtain personal details for the purposes of Internet Fraud.
Security Features
Anti Virus Software
Detects and removes harmful software
Passwords
Adds additional security
Encryption
Changes files and/or passwords to be meaningless without first being unencrypted.
Firewall
Blocks unwanted connections
Can be as strict as you want
Can be highly customised to only allow or block specific connections (i.e. Web Browser, file sharing etc)
Can be Software or Hardware
Security Suites
Provide Antivirus and Firewall
Updates
Detection of all types of threat
Learning Intentions
Can describe ways to protect against threats.
Can understand encryption and avoidance techniques.
Pupils Can...
Success Criteria
Can decrypt simple encrypted message
Can decide which software can help me.
Complete Worksheet
Homework
Full transcript