Friday, January 12th

 

Tech Trends 2018 - Finish group reports

Discuss Homework - Time's Person of the Year - You!

Introduction to Networks

Types of Networks - copy the names of 1-6 and 11. Be sure you can distiquish between these networks. Why are these networks (1-6) listed in this order?

Network Media - create a summary chart comparing the different types of network media.
Wireless networks do not use physical media - what are the strengths and weaknesses of such a network?

Media Samples

Network Topologies - list the three different wired topologies, what is the school's topology?
List the three different types of Ethernet networks and the speed of each.

Network Devices - list these common networking devices.

Home Network Diagram - scroll down to diagram #3 - list the network components used in this network. Does this network match your home network?

Which of these do you have at home?

Finding your Network Settings Lab

 

Introduction to IP Addressing
Complete Understanding IP worksheet

Introduction to Network Protocols
Common protocols - TCP/IP, SMTP, POP, FTP, HTTP, VOIP, DHCP, DNS

TCP/IP, what is your IP address? Your MAC address? Domains and DNS, ISP, Connection Options (p348)

Domains

Web 2.0 Video - by Michael Wesch

How Fast is the Internet Growing

Web 3.0

Review IP Addressing
Read pages 78-83

 

Homework

Read Gray pages 68-79
Answer the following questions:
Exercise 4-4, 4-5, 4-7, 4-8, 4-10, 4-11, 4-12

Review your Criterion D - be sure to get your client's written approval of your design.

Definitions: Internet protocols, for example, HTTP, FTP, TCP/IP, cookies, listserv, web cam, Internet languages, netiquette, Intranet, URL, hyperlink, bandwidth, WWW, browser, search engine, e-mail


 

What

3.3 Networks pages 28-29
Introduction
This topic addresses the role of networks in a range of different scenarios.
The increasing use of networks raises a range of social impacts and ethical issues such as unauthorized
access, intrusive software (viruses, worms and Trojan horses), spam, phishing, pharming, spoofing and
identity theft. Students are expected to discuss possible solutions and evaluate their effectiveness.
Possible scenario
An organization is considering developing a network to facilitate the sharing and transfer of information.
The student must use their knowledge to demonstrate an understanding of:
• the types of networks that exist and the specific scenarios where they are used
• the development of an acceptable-use policy for a network
• the protocols that exist to ensure compatibility within and between networks
• the ways in which the effectiveness of a network may be measured
• the impacts that the ineffective management and network failure can have for many organizations.

IT concepts to address in this topic
Network technologies
• Client, host, server
• Mainframe, supercomputers
• Grid computing, distributed processing

• Ethernet, peer-to-peer (P2P)
• Local area network (LAN), wide area network (WAN), virtual LAN (VLAN), wireless LAN (WLAN), home
network
• Internet, intranet, extranet, virtual private network (VPN)
• Routers, switches, hubs
• Connection types: optical fibre, cable, wireless technologies such as wireless fidelity (WiFi), worldwide
interoperability for microwave access (WiMax), Bluetooth, microwave
• Network operating systems and utility software
• Cloud computing
• Storage technologies: for example, SAN (storage area network), RAID (redundant array of inexpensive
disks)
Network functionality
• Protocols

• Synchronous, asynchronous
• Remote access
• Bandwidth, broadband
• Bit rates
Network administration
• Electronic security: for example, authorized access, levels of access, biometrics, login, password,
firewalls, proxy server, encryption, secure socket layer (SSL), audit trails
• Licences: single-user, multi-user, concurrent, network, site
• Physical security: for example, locks
• Monitoring: for example, keystroke monitoring, system performance, surveillance
• Network policies: for example, backup, archiving, disaster recovery, usage, redundancy, failover
• Codes of ethics and professional conduct: for example, ACM (Association for Computing Machinery)
• Data centres
• Energy usage, uninterruptable power supply (UPS)

 

Why

Almost all businesses, institutions and organizations, and an increasing number of households, are linked by networks.

 

How

By lab exercises and questions