networking curriculum
support CD for senior
secondary studies
networking
> sitemap
Home
History of Networking
Why set up a Network?
OSI Model
Connecting up
Protocols
Technology
Types of Networks
Topologies
Issues
Design Factors
Economic effects
home
Homepage
Credits
Copyright
WWW links
System Requirements
back to top
history
history of data communications
history of networking
history of the internet
back to top
why network?
Communications
Email
Online chat
Videoconferencing
Browse the net
Sharing information
File sharing
Intranet
Group Calendaring
World Wide Web
FTP
Virtual private networks
Sharing equipment
Sharing Hardware
Sharing Software
Sharing resources and services
File saving
Backups
Virus scanning
Help using remote control
Software deployment
Internet provision
DHCP
back to top
osi model
Overview of OSI
The 7 OSI layers
Basic network problems
Network Packets
Packet Handling
-
Ethernet, and CSMA/CD
-
Token Ring
-
ATM
Addressing
Network addresses
IP addressing
-
Subnet Masks
Uniform Resource Locators (URLs)
Email addresses
MAC addresses
Registering and hosting domains
back to top
connecting up
Telephony
10Base-2 Coax BNC
10Base-T Cat5 RJ45
Optical Technologies
Wireless
ADSL
back to top
protocols
Telnet
SMTP/POP3
FTP
HTTP
NNTP
TCP/IP
- the Internet Protocol
back to top
technologies
Network Interface Cards
Hubs
Switches
Bridge
Routers
Servers
Print Servers
back to top
network types
Size
Local Area Network (LAN)
Wide Area Network (WAN)
Metropolitan Area Network (MAN)
The Internet
Function
File serving
Application serving / thin client
Peer-to-peer
Distributed Peer-to-peer
Client-server
Network Operating Systems
Netware/NT Technology
Microsoft Windows
Linux
back to top
topologies
Bus
Star
Ring
Tree
Mesh
back to top
issues
Security
Passwords
Biometrics
Physical security
Backups
Disaster prevention & management
Antivirus software
Encryption
Firewalls
Privacy
Privacy legislation
Ethics
Legal Implications
Publishing responsibilities
Harassment/Equal Opportunity
Network Advantages
Servicing Work stations
Software/Data Maintenance
Security Levels
Communications
Network Dangers
Freeloaders
Hackers
Viruses
back to top
design factors
Compatibility of components
Bandwidth
Ability to produce required information
Cost
Need to secure confidential information
back to top
economic effects
Individuals are able to work from home reducing travelling costs
May need new skills which may incur training costs
Sharing of data may speed up decision making in an organisation
Sharing of resources may reduce running costs in an organisation
Implementing and maintaining a network is an expensive option
Cost of down-time when network fails