2. Types of Network
Types of Networks
Peer-to-peer network (P2P)
Connects two or more computers without going through a central server
computer
Used in home network or small business
Client-Server Network
Client (user) connects to server (central computer)
Server manages disk drives, printers, and network traffic
Server holds copy of application program
9/25/2012 1:13 PM 2
4. Network terms
Hub is used in local area network (LAN) network.
LAN are not an opened network. Can connect LANs.
Data packet goes to one port on hub and hub copies to
all other ports
Hub can be overwhelmed by network traffic as can not
direct data packet to hub instead copies everything to
all ports, which can slow network traffic
9/25/2012 1:13 PM 4
5. Network terms
Switch sorts and distributes data packets between
devices in wired setting such as a LAN
Switch costs more than hub
Router routes data packets for both wireless and wired
data and determines most efficient route to take data
Router can also serve as a gateway that connects LANs,
WANs and internet
Router can be wireless (antennae) vs. wired (no
antennae)
9/25/2012 1:13 PM 5
8. Tips for Using Wi-Fi
Do not log into financial institutions or credit card
accounts
Do not automatically save and store passwords
Disable Wi-Fi when done
When setting up wireless network, use a encryption
method
Have firewall on computer (Start/Control
Panel/System and Security/Windows Firewall) and
router
9/25/2012 1:13 PM 8
9. Definitions of Viruses
Malware stands for malicious software and can include
the following programs
Virus—program that causes harm to computer
Needs human interaction to pass along such as USB drive or
email attachment
Worm—copies itself to other computers without your
awareness or involvement
Attacks networks by slowing them down by using massive
amounts of bandwidth
Attacks vulnerabilities in O/S
9/25/2012 1:13 PM 9
10. Definitions of Viruses
Malware stands for malicious software and can include
the following programs
Trojan Horse—form of malware that acts as useful program when
not
Can’t replicate itself on own but can be very destructive
Copies keystrokes to get into computer system without
knowledge
Phishing
E-mail scam that acts from legitimate source (e.g. bank) to gain
access to your user account information (e.g. e-mail from bank)
Can use e-mail, social media, online chats, or text messages to
gain access to your accounts
9/25/2012 1:13 PM 10
11. Protect Against Viruses
Use Anti-virus software like AVG or Microsoft Security
Essentials
Use Anti-virus software that has spyware protection
Have firewall on your computer and router on
Have virus do deep scan once a week in off hours as
takes long time
Download files and scan with virus protection software
Do not opened attachments from individuals do not
know
Stay away for suspicious e-mails or e-mails from bank
9/25/2012 1:13 PM 11
12. Other terms
Cookies—small file saved on your computer that
remembers your login information or shopping
preferences for websites
Spam—unwanted email
Usually email software has way to filter into folder that is
junk folder
Cloud computing—using Internet to host applications
or file storage
9/25/2012 1:13 PM 12
13. Companies offering Cloud Computing
Companies offering storage space or file applications
Google (e.g. Google Docs for application and store files
on Internet)
Dropbox—store files
Microsoft Skydrive
Amazon—Cloud Player for music
9/25/2012 1:13 PM 13
14. E-mail Etiquette
Use Signature Line
Use Subject Line so not think a virus
Use Proper Greeting at start of message like Dear Mrs
Jones
Be concise
Do not use All Caps
Use spell checker
Proofread
Use humor sparingly
9/25/2012 1:13 PM 14