470x Filetype PPT File size 1.91 MB Source: www.mccc.edu
Technology in Action
Technology in Action
Chapter 7
Chapter 7
Networking and Security:
Networking and Security:
Connecting Computers and Keeping
Connecting Computers and Keeping
Them Safe from Hackers and Viruses
Them Safe from Hackers and Viruses
© 2009 Prentice-Hall, Inc. 2
Chapter Topics
Chapter Topics
• Networking fundamentals
Networking fundamentals
• Network architecture
Network architecture
• Network components
Network components
• Peer-to-peer networks
Peer-to-peer networks
• Ethernet networks
Ethernet networks
• Computer threats
Computer threats
• Computer safeguards
Computer safeguards
• Computer viruses
Computer viruses
© 2009 Prentice-Hall, Inc. 3
Networking Fundamentals
Networking Fundamentals
• Computer network:
Computer network:
–Two or more computers connected together
Two or more computers connected together
–Devices connected to networks: nodes
Devices connected to networks: nodes
• Benefits of a network:
Benefits of a network:
–Sharing resources
Sharing resources
–Transferring files
Transferring files
© 2009 Prentice-Hall, Inc. 4
Network Architecture
Network Architecture
• Network designs:
Network designs:
–Locally administered:
Locally administered:
• Peer-to-peer (P2P)
Peer-to-peer (P2P)
–Centrally administered:
Centrally administered:
• Client/server
Client/server
© 2009 Prentice-Hall, Inc. 5
Peer-to-Peer Networks
Peer-to-Peer Networks
• Nodes communicate
Nodes communicate
with each other:
with each other:
–Peers
Peers
• Share peripheral
Share peripheral
devices
devices
• Used in home and
Used in home and
small office networks
small office networks
© 2009 Prentice-Hall, Inc. 6
no reviews yet
Please Login to review.