267x Filetype PPT File size 1.91 MB Source: www.mccc.edu
Technology in Action Technology in Action Chapter 7 Chapter 7 Networking and Security: Networking and Security: Connecting Computers and Keeping Connecting Computers and Keeping Them Safe from Hackers and Viruses Them Safe from Hackers and Viruses © 2009 Prentice-Hall, Inc. 2 Chapter Topics Chapter Topics • Networking fundamentals Networking fundamentals • Network architecture Network architecture • Network components Network components • Peer-to-peer networks Peer-to-peer networks • Ethernet networks Ethernet networks • Computer threats Computer threats • Computer safeguards Computer safeguards • Computer viruses Computer viruses © 2009 Prentice-Hall, Inc. 3 Networking Fundamentals Networking Fundamentals • Computer network: Computer network: –Two or more computers connected together Two or more computers connected together –Devices connected to networks: nodes Devices connected to networks: nodes • Benefits of a network: Benefits of a network: –Sharing resources Sharing resources –Transferring files Transferring files © 2009 Prentice-Hall, Inc. 4 Network Architecture Network Architecture • Network designs: Network designs: –Locally administered: Locally administered: • Peer-to-peer (P2P) Peer-to-peer (P2P) –Centrally administered: Centrally administered: • Client/server Client/server © 2009 Prentice-Hall, Inc. 5 Peer-to-Peer Networks Peer-to-Peer Networks • Nodes communicate Nodes communicate with each other: with each other: –Peers Peers • Share peripheral Share peripheral devices devices • Used in home and Used in home and small office networks small office networks © 2009 Prentice-Hall, Inc. 6
no reviews yet
Please Login to review.