L12 TechforSuccess - Module10
L12 TechforSuccess - Module10
Networking
Carey/Pinard/Shaffer/Shellman/Vodnik, New Perspectives Collection, Microsoft® Office 365® & Office 2019, 1st Edition. © 2020 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 1
Lesson Objectives
• Discuss the key features of connected networks and explore how
connections between networks are made
• Discuss issues of equity and safety in a connected world
• Connect to different types of networks
Carey/Pinard/Shaffer/Shellman/Vodnik, New Perspectives Collection, Microsoft® Office 365® & Office 2019, 1st Edition. © 2020 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
2
Key Features of Connected Networks
1. Explain how a network operates
2. Define the elements of a connected
network
3. Identify the devices necessary to
create a network
4. Explain the physical connections
between networks and network parts
5. Explain the differences between
various types of networks
Carey/Pinard/Shaffer/Shellman/Vodnik, New Perspectives Collection, Microsoft® Office 365® & Office 2019, 1st Edition. © 2020 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
3
How a Network Operates
• A network is a system of two of more
devices linked by wires, cables, or a
telecommunications system
o Requires a combination of hardware and
software
• Some networks provide connections to the
Internet, which requires the services of an
Internet Service Provider (ISP)
o Enables the network to communicate with
other networks that are also connected to the
Internet
Carey/Pinard/Shaffer/Shellman/Vodnik, New Perspectives Collection, Microsoft® Office 365® & Office 2019, 1st Edition. © 2020 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
4
Elements of a Connected Network
• Hub: transfers all data to all devices
• Switch: transfers data only to the intended
recipient
• Router: device that connects two or more
networks
• Modem: communications device that
connects a communications channel to a
device
o Connects the network to the Internet through
an ISP
• Two main network types: home and business
Carey/Pinard/Shaffer/Shellman/Vodnik, New Perspectives Collection, Microsoft® Office 365® & Office 2019, 1st Edition. © 2020 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
5
Devices Necessary to Create a Network
• Requires two or more devices that need to communicate, a way to
communicate, and the infrastructure to facilitate the communication
o A network interface card (NIC) is required for a computer to connect to a
network
o Cable modem/DSL modem
Carey/Pinard/Shaffer/Shellman/Vodnik, New Perspectives Collection, Microsoft® Office 365® & Office 2019, 1st Edition. © 2020 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
6
Physical Connections Between Networks (1 of 3)
Reference Video:
Table 10-1: Network Topologies https://www.youtube.com/watch?v=zbqrNg4C98U
Topology Details Network arrangement
Bus network Wires on which data All devices attach to a central cable, called a bus, which carries the data.
travels to and from the CPU. If the bus fails, the devices on the network will no longer be able to
communicate.
Ring network Data travels from one device to the next in a sequential fashion. If one
device on the network fails, communication on the network could cease to
function. Ring networks are no longer common.
Star network Each device on the network is attached to a central device such as a
server or switch. If the central device fails, the other devices will be unable
to communicate. If a connected device fails, all other devices will still be
able to communicate. Two or more star networks may be joined together
using a bus to form a tree topology. Tree topologies often are used in
schools and businesses.
Mesh network All devices interconnect with each other. If a single device on the network
fails, the rest of the network will continue to function by communicating via
an alternate route. Two types of mesh topologies are a full mesh topology
(each device on the network is connected to every other device on the
network) and a partial mesh technology (each device may or may not be
connected to all other devices on the network).
Carey/Pinard/Shaffer/Shellman/Vodnik, New Perspectives Collection, Microsoft® Office 365® & Office 2019, 1st Edition. © 2020 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
7
Physical Connections Between Networks (2 of 3)
Network Architecture
• Determines the logical design of
all devices on a network
o Client/server network
o Peer-to-peer (P2P) network
o Cloud computing
Carey/Pinard/Shaffer/Shellman/Vodnik, New Perspectives Collection, Microsoft® Office 365® & Office 2019, 1st Edition. © 2020 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
8
Physical Connections Between Networks (3 of 3)
Geographic Reach
• Local area network (LAN) connects computers and devices in a limited
area
• Wide area network (WAN) connects devices in a large geographic region
• Metropolitan area network (MAN) is operated by a city or county
• Personal area network (PAN) connects personal digital devices within 30
feet via Bluetooth
• Body area network (BAN) small, lightweight biosensors implanted in the
body
Carey/Pinard/Shaffer/Shellman/Vodnik, New Perspectives Collection, Microsoft® Office 365® & Office 2019, 1st Edition. © 2020 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
9
Differences Between Various Types of Networks
Table 10-2: Additional Network Types
Network type Description
Wired network Sends signals and data through cables, which may have to travel through floors and walls to
connect to other network devices. Wired networks tend to be more secure and transmit data
faster than wireless networks.
Wireless network A type of printer or Sends signals through airwaves, and usually do not require cables. Wireless networks tend to
other device that is connected to either a be more convenient and easier to set up than wired networks, but can be less secure.
wired or wireless network to which you Wireless networks make it possible to connect devices in locations where physical wiring is
have access. not possible or is difficult.
Intranet An internal network site used by A private network for use by authorized individuals. Organizations use intranets to
a group of people who work together. communicate internally and can allow users to use a web browser to access data posted on
webpages. Intranets are preferable when data being transferred should not necessarily reach
the Internet.
Extranet Allows outsiders (such as customers, vendors, and suppliers) to access an organization’s
intranet. For example, an extranet might be used if a supplier needs to check a customer’s
inventory levels before deciding whether to ship additional product.
Virtual private network (VPN) A private, secure path across a public network that allows authorized users secure access to a
company or other network. A VPN can allow an individual to access an organization’s network
by using encryption and other technologies to secure the data transmitted along the path.
Carey/Pinard/Shaffer/Shellman/Vodnik, New Perspectives Collection, Microsoft® Office 365® & Office 2019, 1st Edition. © 2020 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
10
Discuss Issues of Equity and Safety in a Connected
World
1. Identify the risks and benefits associated with using a connected network
2. Explain how unauthorized network use threatens communication
technology
3. Explain how to secure a network
4. Secure data stored on a network
5. Explain how to encrypt a network
6. Explain the pros and cons of net neutrality
Carey/Pinard/Shaffer/Shellman/Vodnik, New Perspectives Collection, Microsoft® Office 365® & Office 2019, 1st Edition. © 2020 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
11
Risks and Benefits with Using a Connected Network
Carey/Pinard/Shaffer/Shellman/Vodnik, New Perspectives Collection, Microsoft® Office 365® & Office 2019, 1st Edition. © 2020 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
12
How Unauthorized Network Use Threatens
Communications
• When hackers can connect to the same network as the computer they wish
to target, it is easier to obtain information
• Data also might be exposed by connecting to a fraudulent network
o When connecting to a public Wi-Fi network, one should not enter confidential
information on websites or send personal data in email
o Evil twin
Carey/Pinard/Shaffer/Shellman/Vodnik, New Perspectives Collection, Microsoft® Office 365® & Office 2019, 1st Edition. © 2020 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
13
How to Secure a Network
• Authentication
o User name and a strong password
o Biometrics
• Firewall
o Hardware firewalls
o Software firewalls
• Encryption
Carey/Pinard/Shaffer/Shellman/Vodnik, New Perspectives Collection, Microsoft® Office 365® & Office 2019, 1st Edition. © 2020 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
14
Secure Data Stored on a Network
• Network attached storage (NAS) devices are hard drives that connect
directly to a network and provide a centralized location for storing programs
and data on large and small networks
o Specify users who can view the files, as well as view and make changes to the
files
• Turn on network encryption so that information from files being transmitted
on the network cannot be intercepted by others
Carey/Pinard/Shaffer/Shellman/Vodnik, New Perspectives Collection, Microsoft® Office 365® & Office 2019, 1st Edition. © 2020 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
15
How to Encrypt a Network
• Encryption is the process of converting data so that it is unrecognizable
when it is trans- mitted on a network or stored on a storage device, except to
users who enter the correct password
• Ensure that wireless networks support encryption so that data cannot be
intercepted easily by others
o Encrypted wireless networks often use a wireless network key to encrypt data
sent between devices
o One common type of encryption on home routers is WPA2
Carey/Pinard/Shaffer/Shellman/Vodnik, New Perspectives Collection, Microsoft® Office 365® & Office 2019, 1st Edition. © 2020 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
16
Pros and Cons of Net Neutrality
• When net neutrality is enforced, ISPs must provide the same level of
service to all websites, regardless of their content or purpose
• Pros:
o Access to websites cannot be restricted based on factors such as content or
bandwidth requirements
• Cons:
o The ability for users to access high-bandwidth content might result in slower
Internet speeds for others who are also connecting to the Internet using the same
ISPs
o Without net neutrality, ISPs could charge more for those wanting access to
content requiring more resources and less to those who require access to less
resource-intensive services
Carey/Pinard/Shaffer/Shellman/Vodnik, New Perspectives Collection, Microsoft® Office 365® & Office 2019, 1st Edition. © 2020 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
17
Connecting to Different Types of Networks
1. Explain how to follow network standards and protocols
2. Connect to network devices
Carey/Pinard/Shaffer/Shellman/Vodnik, New Perspectives Collection, Microsoft® Office 365® & Office 2019, 1st Edition. © 2020 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
18
Following Network Standards and Protocols (1 of 3)
Table 10-4: Network Standards
Carey/Pinard/Shaffer/Shellman/Vodnik, New Perspectives Collection, Microsoft® Office 365® & Office 2019, 1st Edition. © 2020 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
19
Following Network Standards and Protocols (2 of 3)
• Computers communicating with each other on a network must follow a
common set of rules for exchanging information, or protocols
o TCP/IP (Transmission Control Protocol/Internet Protocol)
• Cellular Networks: millions of people use their mobile phones to access the
Internet
o Cellular networks can provide Internet services in most locations where cellular
service is offered
o 4G and 5G networks provide higher speed data transmission
Carey/Pinard/Shaffer/Shellman/Vodnik, New Perspectives Collection, Microsoft® Office 365® & Office 2019, 1st Edition. © 2020 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
20
Following Network Standards and Protocols (3 of 3)
Table 10-5: Close-Distance Network Protocols
Carey/Pinard/Shaffer/Shellman/Vodnik, New Perspectives Collection, Microsoft® Office 365® & Office 2019, 1st Edition. © 2020 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
21
Connect to Network Devices (1 of 3)
• Setting up and connecting to a home wireless
network: may vary depending on the network
hardware, size of home, and devices to be
connected.
o Purchase a modem or separate wireless router and
connect it to your home’s Internet service
o Enable the wireless network
o Configure a name for the network
o Configure a wireless network key
o Enable each device’s wireless functionality
o On the device, search for and connect to the
wireless network
o Enter the wireless network key
Carey/Pinard/Shaffer/Shellman/Vodnik, New Perspectives Collection, Microsoft® Office 365® & Office 2019, 1st Edition. © 2020 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
22
Connect to Network Devices (2 of 3)
• Wi-fi hot spots: wireless networks
that are available in public places
• Mobile hot spots: enables one to
connect a phone, computer or other
device to the Internet through the
cellular network
o Many smartphones contain mobile
hotspot functionality, although cellular
providers may charge an extra fee to
use it, and any data transmitted or
received through the hotspot will be
added to the overall data usage
Carey/Pinard/Shaffer/Shellman/Vodnik, New Perspectives Collection, Microsoft® Office 365® & Office 2019, 1st Edition. © 2020 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
23
Connect to Network Devices (3 of 3)
• Safety Precautions for Wireless Networks
o Change the administrative password for the router
o Change the wireless network name from the default
o Enable encryption, and choose a secure wireless network key that is difficult to
guess
o Regularly change your wireless network key
o Regularly review the number of devices connect to the network
o Enable and configure the MAC address control feature
o Choose a secure location for the wireless router
o Regularly perform router firmware updates
Carey/Pinard/Shaffer/Shellman/Vodnik, New Perspectives Collection, Microsoft® Office 365® & Office 2019, 1st Edition. © 2020 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
24