Upload
ruth-osborne
View
212
Download
0
Embed Size (px)
Citation preview
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 1
Chapter 6 Summary QuestionsChapter 6 Summary QuestionsChapter 6 Summary QuestionsChapter 6 Summary Questions
• How can I determine whether I should How can I determine whether I should upgrade my existing computer or buy a upgrade my existing computer or buy a new one?new one?
• What does the CPU do and how can I What does the CPU do and how can I evaluate its performance?evaluate its performance?
• How does memory work and how can I How does memory work and how can I evaluate how much memory I need?evaluate how much memory I need?
• What are the computer’s main storage What are the computer’s main storage devices and how can I evaluate whether devices and how can I evaluate whether they match my needs?they match my needs?
• How can I determine whether I should How can I determine whether I should upgrade my existing computer or buy a upgrade my existing computer or buy a new one?new one?
• What does the CPU do and how can I What does the CPU do and how can I evaluate its performance?evaluate its performance?
• How does memory work and how can I How does memory work and how can I evaluate how much memory I need?evaluate how much memory I need?
• What are the computer’s main storage What are the computer’s main storage devices and how can I evaluate whether devices and how can I evaluate whether they match my needs?they match my needs?
NEXT SLIDE
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 2
Chapter 6 Summary QuestionsChapter 6 Summary QuestionsChapter 6 Summary QuestionsChapter 6 Summary Questions
• What components affect the output of What components affect the output of video and how can I evaluate whether video and how can I evaluate whether they are meeting my needs?they are meeting my needs?
• What components affect the quality of What components affect the quality of sound and how can I evaluate whether sound and how can I evaluate whether they are meeting my needs?they are meeting my needs?
• What components affect the output of What components affect the output of video and how can I evaluate whether video and how can I evaluate whether they are meeting my needs?they are meeting my needs?
• What components affect the quality of What components affect the quality of sound and how can I evaluate whether sound and how can I evaluate whether they are meeting my needs?they are meeting my needs?
NEXT SLIDE
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 3
Technology In ActionTechnology In ActionTechnology In ActionTechnology In Action
Chapter 7Chapter 7
Networking and Security: Connecting Networking and Security: Connecting Computers and Keeping Them Safe from Computers and Keeping Them Safe from
Hackers and VirusesHackers and Viruses
Chapter 7Chapter 7
Networking and Security: Connecting Networking and Security: Connecting Computers and Keeping Them Safe from Computers and Keeping Them Safe from
Hackers and VirusesHackers and Viruses
NEXT SLIDE
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 4
TopicsTopicsTopicsTopics
• Networking fundamentalsNetworking fundamentals• Network architectureNetwork architecture• Network componentsNetwork components• Peer-to-peer networksPeer-to-peer networks• Computer threatsComputer threats• Computer safeguardsComputer safeguards• Computer virusesComputer viruses
• Networking fundamentalsNetworking fundamentals• Network architectureNetwork architecture• Network componentsNetwork components• Peer-to-peer networksPeer-to-peer networks• Computer threatsComputer threats• Computer safeguardsComputer safeguards• Computer virusesComputer viruses
NEXT SLIDENEXT SLIDE
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 5
Networking FundamentalsNetworking FundamentalsNetworking FundamentalsNetworking Fundamentals
• Computer network:Computer network:– Two or more computers connected togetherTwo or more computers connected together– Nodes Nodes
• Benefits of a network:Benefits of a network:– Sharing resourcesSharing resources– Transferring filesTransferring files– Sharing internetSharing internet
• Computer network:Computer network:– Two or more computers connected togetherTwo or more computers connected together– Nodes Nodes
• Benefits of a network:Benefits of a network:– Sharing resourcesSharing resources– Transferring filesTransferring files– Sharing internetSharing internet
NEXT SLIDE
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 6
Network ArchitectureNetwork ArchitectureNetwork ArchitectureNetwork Architecture
• Network designs:Network designs:– Locally controlled:Locally controlled:
Peer-to-peer (P2P)Peer-to-peer (P2P)
– Centrally controlled:Centrally controlled:Client/serverClient/server
• Network designs:Network designs:– Locally controlled:Locally controlled:
Peer-to-peer (P2P)Peer-to-peer (P2P)
– Centrally controlled:Centrally controlled:Client/serverClient/server
Peer-to-peer
Client/server
NEXT SLIDE
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 7
Peer-to-Peer NetworksPeer-to-Peer NetworksPeer-to-Peer NetworksPeer-to-Peer Networks
• Nodes communicate Nodes communicate with each other:with each other:– PeersPeers
• Share peripheral Share peripheral devices:devices:– PrintersPrinters– Scanners Scanners
• Home and small office Home and small office networks networks
• Nodes communicate Nodes communicate with each other:with each other:– PeersPeers
• Share peripheral Share peripheral devices:devices:– PrintersPrinters– Scanners Scanners
• Home and small office Home and small office networks networks
NEXT SLIDE
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 8
Client/Server NetworksClient/Server NetworksClient/Server NetworksClient/Server Networks
• Client computers:Client computers:– Users Users
• Server computers:Server computers:– Provide resources to clientsProvide resources to clients– Central control unitCentral control unit
• InternetInternet
• Client computers:Client computers:– Users Users
• Server computers:Server computers:– Provide resources to clientsProvide resources to clients– Central control unitCentral control unit
• InternetInternet
NEXT SLIDE
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 9
LANs and WANsLANs and WANsLANs and WANsLANs and WANs
• Local area network (LAN):Local area network (LAN):– Nodes are within a small geographic region:Nodes are within a small geographic region:
HomesHomesSchoolsSchoolsSmall businessesSmall businesses
• Wide area network (WAN):Wide area network (WAN):– LANs connected over long distances:LANs connected over long distances:
A few miles to thousands of milesA few miles to thousands of milesUse telecommunications linesUse telecommunications lines
• Local area network (LAN):Local area network (LAN):– Nodes are within a small geographic region:Nodes are within a small geographic region:
HomesHomesSchoolsSchoolsSmall businessesSmall businesses
• Wide area network (WAN):Wide area network (WAN):– LANs connected over long distances:LANs connected over long distances:
A few miles to thousands of milesA few miles to thousands of milesUse telecommunications linesUse telecommunications lines
NEXT SLIDE
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 10
Network ComponentsNetwork ComponentsNetwork ComponentsNetwork Components
• Transmission mediaTransmission media• Network adaptersNetwork adapters• Navigation devicesNavigation devices• Network softwareNetwork software
• Transmission mediaTransmission media• Network adaptersNetwork adapters• Navigation devicesNavigation devices• Network softwareNetwork software
NEXT SLIDE
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 11
Transmission MediaTransmission MediaTransmission MediaTransmission Media
• Provides communications channel Provides communications channel between nodesbetween nodes
• Forms of media:Forms of media:– Telephone wire:Telephone wire:
Twisted pairTwisted pair
– Coaxial cableCoaxial cable– Fiber-optic cableFiber-optic cable– Radio waves:Radio waves:
WirelessWireless
• Bandwidth:Bandwidth:– Data transfer rate, throughputData transfer rate, throughput
• Provides communications channel Provides communications channel between nodesbetween nodes
• Forms of media:Forms of media:– Telephone wire:Telephone wire:
Twisted pairTwisted pair
– Coaxial cableCoaxial cable– Fiber-optic cableFiber-optic cable– Radio waves:Radio waves:
WirelessWireless
• Bandwidth:Bandwidth:– Data transfer rate, throughputData transfer rate, throughput
NEXT SLIDE
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 12
Network AdaptersNetwork AdaptersNetwork AdaptersNetwork Adapters
• Devices connected to or installed in nodes:Devices connected to or installed in nodes:– Network interface cards (NIC)Network interface cards (NIC)– External network adapterExternal network adapter
• Enable communication between nodesEnable communication between nodes
• Devices connected to or installed in nodes:Devices connected to or installed in nodes:– Network interface cards (NIC)Network interface cards (NIC)– External network adapterExternal network adapter
• Enable communication between nodesEnable communication between nodes
NICExternal adapter
NEXT SLIDE
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 13
Network Navigation DevicesNetwork Navigation DevicesNetwork Navigation DevicesNetwork Navigation Devices• Devices that help make data flow possibleDevices that help make data flow possible
– PacketsPackets
• Routers:Routers:– Route data between networksRoute data between networks
• Hubs:Hubs:– Receive data and retransmit it to nodes on the Receive data and retransmit it to nodes on the
networknetwork
• Devices that help make data flow possibleDevices that help make data flow possible– PacketsPackets
• Routers:Routers:– Route data between networksRoute data between networks
• Hubs:Hubs:– Receive data and retransmit it to nodes on the Receive data and retransmit it to nodes on the
networknetworkHub Router
NEXT SLIDE
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 14
Networking SoftwareNetworking SoftwareNetworking SoftwareNetworking Software
• Software needed:Software needed:– Peer-to-peer:Peer-to-peer:
Operating systems that support networkingOperating systems that support networkingWindowsWindowsMac OSMac OS
– Client/server:Client/server:Network operating system (NOS) softwareNetwork operating system (NOS) softwareWindows XP ProfessionalWindows XP ProfessionalWindows Server 2003Windows Server 2003Novell NetwareNovell Netware
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 15
Types of Peer-to-Peer NetworksTypes of Peer-to-Peer NetworksTypes of Peer-to-Peer NetworksTypes of Peer-to-Peer Networks
• Power linePower line• Phone linePhone line• EthernetEthernet• Wireless Wireless
• Power linePower line• Phone linePhone line• EthernetEthernet• Wireless Wireless
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 16
Power Line NetworksPower Line NetworksPower Line NetworksPower Line Networks
• Computers are connected to a house’s Computers are connected to a house’s electrical wiring to create a networkelectrical wiring to create a network
• Power line network adapter is used to Power line network adapter is used to connect nodes to electrical outletsconnect nodes to electrical outlets
• Computers are connected to a house’s Computers are connected to a house’s electrical wiring to create a networkelectrical wiring to create a network
• Power line network adapter is used to Power line network adapter is used to connect nodes to electrical outletsconnect nodes to electrical outlets
NEXT SLIDE
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 17
Phone Line NetworksPhone Line NetworksPhone Line NetworksPhone Line Networks
• Computers are connected Computers are connected to a house’s telephone to a house’s telephone wiring to create a networkwiring to create a network
• Home phone line network Home phone line network adapter is used to adapter is used to connect nodes to phone connect nodes to phone jacksjacks
• Computers are connected Computers are connected to a house’s telephone to a house’s telephone wiring to create a networkwiring to create a network
• Home phone line network Home phone line network adapter is used to adapter is used to connect nodes to phone connect nodes to phone jacksjacks
NEXT SLIDE
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 18
Ethernet NetworksEthernet NetworksEthernet NetworksEthernet Networks• Computers are connected to each other Computers are connected to each other
using unshielded twisted pair cable (UTP)using unshielded twisted pair cable (UTP)– Cat 5 (100Mbps), Cat 5E(200Mbps), Cat 6(1Gbps)Cat 5 (100Mbps), Cat 5E(200Mbps), Cat 6(1Gbps)
• Ethernet network adapters are used to Ethernet network adapters are used to connect nodesconnect nodes– NICNIC– PC cardPC card– USB adapterUSB adapter
• Computers are connected to each other Computers are connected to each other using unshielded twisted pair cable (UTP)using unshielded twisted pair cable (UTP)– Cat 5 (100Mbps), Cat 5E(200Mbps), Cat 6(1Gbps)Cat 5 (100Mbps), Cat 5E(200Mbps), Cat 6(1Gbps)
• Ethernet network adapters are used to Ethernet network adapters are used to connect nodesconnect nodes– NICNIC– PC cardPC card– USB adapterUSB adapter
NEXT SLIDE
RJ-45
conn
ecto
r
PC card
NIC card
USB
adap
ter
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 19
Ethernet HubsEthernet HubsEthernet HubsEthernet Hubs
• Keep track of data packetsKeep track of data packets• Amplify and retransmit signalsAmplify and retransmit signals• Keep the network running efficientlyKeep the network running efficiently
• Keep track of data packetsKeep track of data packets• Amplify and retransmit signalsAmplify and retransmit signals• Keep the network running efficientlyKeep the network running efficiently
NEXT SLIDE
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 20
Ethernet RoutersEthernet RoutersEthernet RoutersEthernet Routers
• Route packets of data between networksRoute packets of data between networks• Router needed to send data between the Router needed to send data between the
network and the Internetnetwork and the Internet
• Route packets of data between networksRoute packets of data between networks• Router needed to send data between the Router needed to send data between the
network and the Internetnetwork and the Internet
NEXT SLIDE
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 21
Wireless NetworksWireless NetworksWireless NetworksWireless Networks• Use radio waves to connect nodesUse radio waves to connect nodes• 802.11 standard (Wi-Fi: Wireless Fidelity)802.11 standard (Wi-Fi: Wireless Fidelity)
– 802.11b (11Mbps), 802.11g(54Mbps)802.11b (11Mbps), 802.11g(54Mbps)
• Basically an Ethernet network that uses Basically an Ethernet network that uses radio waves instead of wiresradio waves instead of wires
• Each node requires a wireless network Each node requires a wireless network adapter:adapter:– Transceiver Transceiver
• Use radio waves to connect nodesUse radio waves to connect nodes• 802.11 standard (Wi-Fi: Wireless Fidelity)802.11 standard (Wi-Fi: Wireless Fidelity)
– 802.11b (11Mbps), 802.11g(54Mbps)802.11b (11Mbps), 802.11g(54Mbps)
• Basically an Ethernet network that uses Basically an Ethernet network that uses radio waves instead of wiresradio waves instead of wires
• Each node requires a wireless network Each node requires a wireless network adapter:adapter:– Transceiver Transceiver
NEXT SLIDE
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 22
LimitationLimitationLimitationLimitation
• Maximum range: 250 feetMaximum range: 250 feet• Interference with other wireless devicesInterference with other wireless devices• Obstacles between wireless nodesObstacles between wireless nodes
– WallWall– Large metal objectsLarge metal objects
• Wireless DSL/cable routerWireless DSL/cable router
• Maximum range: 250 feetMaximum range: 250 feet• Interference with other wireless devicesInterference with other wireless devices• Obstacles between wireless nodesObstacles between wireless nodes
– WallWall– Large metal objectsLarge metal objects
• Wireless DSL/cable routerWireless DSL/cable router
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 23
Choosing a Peer-to-Peer NetworkChoosing a Peer-to-Peer NetworkChoosing a Peer-to-Peer NetworkChoosing a Peer-to-Peer Network
• Things to consider:Things to consider:– Existing wiringExisting wiring– Wireless or wiredWireless or wired– Speed of the networkSpeed of the network– Cost of the networkCost of the network
• Things to consider:Things to consider:– Existing wiringExisting wiring– Wireless or wiredWireless or wired– Speed of the networkSpeed of the network– Cost of the networkCost of the network
NEXT SLIDE
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 24
ComparisonComparisonComparisonComparison
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 25
Configuring Software for a Home Configuring Software for a Home NetworkNetwork
Configuring Software for a Home Configuring Software for a Home NetworkNetwork
• Windows operating system:Windows operating system:– Windows XP:Windows XP:
Network setup wizardNetwork setup wizard
– Windows ME:Windows ME:Network setup wizardNetwork setup wizard
– Windows 98:Windows 98:Configure manuallyConfigure manually
• Windows operating system:Windows operating system:– Windows XP:Windows XP:
Network setup wizardNetwork setup wizard
– Windows ME:Windows ME:Network setup wizardNetwork setup wizard
– Windows 98:Windows 98:Configure manuallyConfigure manually
NEXT SLIDE
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 26
Computer ThreatsComputer ThreatsComputer ThreatsComputer Threats
• Cyber-crimeCyber-crime• Hackers:Hackers:
– Who they areWho they are– What they doWhat they do– How they gain accessHow they gain access
• Cyber-crimeCyber-crime• Hackers:Hackers:
– Who they areWho they are– What they doWhat they do– How they gain accessHow they gain access
NEXT SLIDE
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 27
Cyber-crimes and Cyber-criminalsCyber-crimes and Cyber-criminalsCyber-crimes and Cyber-criminalsCyber-crimes and Cyber-criminals
• Cyber-crimes are criminal Cyber-crimes are criminal acts conducted through acts conducted through the use of a computer:the use of a computer:– FraudFraud– Identity theftIdentity theft
• Cyber-criminals are Cyber-criminals are individuals who use a individuals who use a computer to commit a computer to commit a crimecrime
• Cyber-crimes are criminal Cyber-crimes are criminal acts conducted through acts conducted through the use of a computer:the use of a computer:– FraudFraud– Identity theftIdentity theft
• Cyber-criminals are Cyber-criminals are individuals who use a individuals who use a computer to commit a computer to commit a crimecrime
NEXT SLIDE
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 28
Hackers Hackers Hackers Hackers
• Anyone who unlawfully accesses a Anyone who unlawfully accesses a computer systemcomputer system
• Types of hackers:Types of hackers:– Cracker Cracker – White-hatWhite-hat– Black-hatBlack-hat– Script kiddiesScript kiddies
• Anyone who unlawfully accesses a Anyone who unlawfully accesses a computer systemcomputer system
• Types of hackers:Types of hackers:– Cracker Cracker – White-hatWhite-hat– Black-hatBlack-hat– Script kiddiesScript kiddies
NEXT SLIDE
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 29
What Hackers DoWhat Hackers DoWhat Hackers DoWhat Hackers Do
• Steal information from computers:Steal information from computers:– Credit card numbersCredit card numbers– Bank account numbersBank account numbers
• Internet packet sniffingInternet packet sniffing• Commit identity theftCommit identity theft• Create widespread computer attacks:Create widespread computer attacks:
– Backdoor programs (Trojan horse)Backdoor programs (Trojan horse)– Zombies Zombies
• Denial of service attacks (DoS)Denial of service attacks (DoS)• Distributed denial of service (DDoS) attacksDistributed denial of service (DDoS) attacks
NEXT SLIDE
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 30
How Hackers Gain AccessHow Hackers Gain AccessHow Hackers Gain AccessHow Hackers Gain Access
• Direct access:Direct access:– Hacking softwareHacking software
• Indirect access:Indirect access:– Internet connectionInternet connection– Logical portsLogical ports
HTTP: 80HTTP: 80SMTP: 25SMTP: 25
• Direct access:Direct access:– Hacking softwareHacking software
• Indirect access:Indirect access:– Internet connectionInternet connection– Logical portsLogical ports
HTTP: 80HTTP: 80SMTP: 25SMTP: 25
NEXT SLIDE
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 31
Computer SafeguardsComputer SafeguardsComputer SafeguardsComputer Safeguards
• Firewalls Firewalls • Viruses and antivirus softwareViruses and antivirus software
• Firewalls Firewalls • Viruses and antivirus softwareViruses and antivirus software
NEXT SLIDE
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 32
Firewalls Firewalls Firewalls Firewalls
• Software programs or hardware designed Software programs or hardware designed to close logical ports to invadersto close logical ports to invaders
• Types of firewalls:Types of firewalls:– Norton Personal FirewallNorton Personal Firewall– McAfee FirewallMcAfee Firewall– Zone AlarmZone Alarm– BlackICE PC ProtectionBlackICE PC Protection– Network routersNetwork routers
• Software programs or hardware designed Software programs or hardware designed to close logical ports to invadersto close logical ports to invaders
• Types of firewalls:Types of firewalls:– Norton Personal FirewallNorton Personal Firewall– McAfee FirewallMcAfee Firewall– Zone AlarmZone Alarm– BlackICE PC ProtectionBlackICE PC Protection– Network routersNetwork routers
NEXT SLIDE
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 33
Is your computer secure?Is your computer secure?Is your computer secure?Is your computer secure?
• Gibson Research CorporationGibson Research Corporation– www.grc.comwww.grc.com– ShieldsUPShieldsUP– LeakTestLeakTest
• QualysQualys– http://http://browsercheck.qualys.combrowsercheck.qualys.com
• Gibson Research CorporationGibson Research Corporation– www.grc.comwww.grc.com– ShieldsUPShieldsUP– LeakTestLeakTest
• QualysQualys– http://http://browsercheck.qualys.combrowsercheck.qualys.com
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 34
Chapter 7 Summary QuestionsChapter 7 Summary QuestionsChapter 7 Summary QuestionsChapter 7 Summary Questions
• What is a network and what are the What is a network and what are the advantages of setting up one?advantages of setting up one?
• What is the difference between a What is the difference between a client/server network and a peer-to-peer client/server network and a peer-to-peer network?network?
• What are the main components of every What are the main components of every network?network?
• What are the most common home What are the most common home networks?networks?
• What is a network and what are the What is a network and what are the advantages of setting up one?advantages of setting up one?
• What is the difference between a What is the difference between a client/server network and a peer-to-peer client/server network and a peer-to-peer network?network?
• What are the main components of every What are the main components of every network?network?
• What are the most common home What are the most common home networks?networks?
NEXT SLIDE
Technology In Action Chapter 7
© 2006 Prentice-Hall, Inc. 35
Chapter 7 Summary QuestionsChapter 7 Summary QuestionsChapter 7 Summary QuestionsChapter 7 Summary Questions
• What are power line networks?What are power line networks?• What are phone line networks?What are phone line networks?• What are Ethernet networks?What are Ethernet networks?• What are wireless networks?What are wireless networks?• How can hackers attack a network and How can hackers attack a network and
what harm can they cause?what harm can they cause?• What is a firewall and how does it keep my What is a firewall and how does it keep my
computer safe from hackers?computer safe from hackers?
• What are power line networks?What are power line networks?• What are phone line networks?What are phone line networks?• What are Ethernet networks?What are Ethernet networks?• What are wireless networks?What are wireless networks?• How can hackers attack a network and How can hackers attack a network and
what harm can they cause?what harm can they cause?• What is a firewall and how does it keep my What is a firewall and how does it keep my
computer safe from hackers?computer safe from hackers?
NEXT SLIDE