Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
You can change this under Settings & Account at any time.
N5 Computer Networking
Transcript of N5 Computer Networking
Types of Network
ISDD - Networking
What is a Network?
The difference between a Local Area Network (LAN)
and a Wide Area Network (WAN)
Types of Connectivity
Computers can be Networked
A Computer can be standalone without connecting to or communicating with any other computer.
Local Area Network (LAN)
In the House
In the Workplace
Advantages of LAN
Login on any PC
Disadvantages of LAN
Can be Expensive
Viruses can Spread
Before Networking all Computers were Standalone
Risks to network security and steps you can take to avoid them.
Open the exercise sheet on Pupil Shared.
Wide Area Network (WAN)
Companies can distribute their network all over the world with one management structure.
Cat5e Twisted Pair
Extremely Fast 100 Terabytes per Second Possible
Difficult to intercept data (secure)
Expensive to install
Usually only for high demand links
Becoming more available at home
Physical Connectivity (LAN)
Used for wireless mouse and keyboard
Range of about 10 metres
WIFI (Wireless Fidelity Alliance)
Range of about 12-50 metres
All use Radio Waves
1. Name 2 types of cable used in a network.
2. What type of cable does the school have on its LAN?
3. How can you link up the computers at home without using cables?
Not as common now but still used
Used in most networks
Types of Media &
Client / Server
Connected to the Network
Server Provides Resources for Clients
Printer Server - Manages print queues
File Server* - Sharing of collection of files
Proxy Server - Sharing of internet connection
Web Server - Share web sites
Database Server - Stores and allows access to databases
Computing's Answer to Ferrari
Usually very expensive
Can respond much quicker than a normal system.
Why use a Server?
Organise Security for Whole Network
Backups of whole network
User accounts centralised and more controllable from one system (the server)
WAN it may
be useful to
Peer-to-Peer vs Client/Server
Physical Connectivity (WAN)
Usually a mixture!
The Internet is a massive WAN
Slower than a LAN because of cabling and distance - But getting faster thanks to Fibre Optic becoming more common!
Advantages of WAN
World wide Email
World Wide Web
World wide File Transfer
Multiple LANs linked together to form a WAN
Disadvantages of WAN
Next Lesson we will look more in-depth at these threats plus more
Gathers personal data and forwards it without consent
Detects key presses and seeks out patterns (commonly typed passwords, credit cards, names etc.)
Deceiving the user into thinking that they are on another website to obtain sensitive information (credit card details, logins)
Denial of Service Attack
Deception of internet users in order to take advantage of them, usually financial gain.
Pretending to be somebody else using stolen details for personal gain.
I can describe Internet Fraud, specifically:
I have a completed worksheet which shows my understanding of:
Noteworthy Cyber Attacks and how they worked.
Common methods used to obtain personal details for the purposes of Internet Fraud.
Anti Virus Software
Detects and removes harmful software
Adds additional security
Changes files and/or passwords to be meaningless without first being unencrypted.
Blocks unwanted connections
Can be as strict as you want
Can be highly customised to only allow or block specific connections (i.e. Web Browser, file sharing etc)
Can be Software or Hardware
Provide Antivirus and Firewall
Detection of all types of threat
Can describe ways to protect against threats.
Can understand encryption and avoidance techniques.
Can decrypt simple encrypted message
Can decide which software can help me.