SlideShare une entreprise Scribd logo
1  sur  51
Technology in Action
Technology In Action ,[object Object],[object Object],[object Object],[object Object]
Chapter Topics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Networking Fundamentals ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Network Architecture ,[object Object],[object Object],[object Object],[object Object],[object Object],Peer-to-peer Client/server
Peer-to-Peer Networks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Client/Server Networks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
LANs and WANs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Network Components ,[object Object],[object Object],[object Object],[object Object]
Transmission Media ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Network Adapters ,[object Object],[object Object],[object Object],[object Object]
Network Navigation Devices ,[object Object],[object Object],[object Object],[object Object],[object Object]
Networking Software ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Types of Peer-to-Peer Networks ,[object Object],[object Object],[object Object],[object Object]
Ethernet Networks ,[object Object],[object Object],[object Object],[object Object],[object Object],RJ-45 Phoneline
Ethernet Switches ,[object Object],[object Object],[object Object]
Ethernet Routers ,[object Object],[object Object],Router
Wireless Networks ,[object Object],[object Object],[object Object],[object Object]
Wireless Computing Landscape
UTD Wireless Access Points
Power-Line Networks ,[object Object],[object Object]
Phoneline Networks ,[object Object],[object Object]
Choosing a Peer-to-Peer Network ,[object Object],[object Object],[object Object],[object Object],[object Object],$$$ $$ $ $ Relative installation and equipment costs for networking two computers 100 to 630 bps 108 Mbps 54 Mbps 100 Mbps to  1,000 bps (1 gigabit) Maximum data Transfer rate  (bandwidth)   Wireless 802.11n Wireless  Enhanced G Wireless  802.11g Wired  Ethernet Comparing the Major Types of Home Networks
Configuring Software  for a Home  Network ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Computer Threats ,[object Object]
Hackers  ,[object Object],[object Object],[object Object],[object Object],[object Object]
What Hackers Do ,[object Object],[object Object],[object Object],[object Object],[object Object]
Denial of Service Attacks ,[object Object],[object Object],[object Object],[object Object]
How Hackers Gain Access ,[object Object],[object Object],[object Object],[object Object],[object Object]
Computer Safeguards Firewalls  ,[object Object],[object Object],[object Object],[object Object]
Protecting a Wireless Network ,[object Object],[object Object],[object Object],[object Object]
Computer Threat - Viruses ,[object Object],[object Object]
How Does a Computer  Catch a Virus ,[object Object],[object Object],[object Object],[object Object]
What Viruses Do ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Types of Viruses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Types of Viruses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Virus Classifications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Antivirus Software ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter 7 Summary Questions ,[object Object]
Chapter 7 Summary Questions ,[object Object]
Chapter 7 Summary Questions ,[object Object]
Chapter 7 Summary Questions ,[object Object]
Chapter 7 Summary Questions ,[object Object]
Chapter 7 Summary Questions ,[object Object]
Chapter 7 Summary Questions ,[object Object]
Chapter 7 Summary Questions ,[object Object]
Chapter 7 Summary Questions ,[object Object]
Chapter 7 Summary Questions ,[object Object]
Chapter 7 Summary Questions ,[object Object]
Chapter 7 Summary Questions ,[object Object]
Chapter 7 Summary Questions ,[object Object]

Contenu connexe

Tendances

Muo Network Manual
Muo Network ManualMuo Network Manual
Muo Network Manualprashant0001
 
Classification of computer networks
Classification of computer networksClassification of computer networks
Classification of computer networksSujon Kumar Dey
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan securityAnkit Anand
 
FIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALAFIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALASaikiran Panjala
 
Info systems design and development
Info systems design and developmentInfo systems design and development
Info systems design and developmentiarthur
 
Prensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection toolPrensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection toolIssar Kapadia
 
Presentation3 network
Presentation3 networkPresentation3 network
Presentation3 networkRana Muzffar
 
The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005Bill Drew
 
Network concepts and wi fi
Network concepts and wi fiNetwork concepts and wi fi
Network concepts and wi fiDeepak John
 
Classification of computer network
Classification of computer networkClassification of computer network
Classification of computer networkMdMizanurRahma18
 
shawn.rainbolt.it241.week7.3
shawn.rainbolt.it241.week7.3shawn.rainbolt.it241.week7.3
shawn.rainbolt.it241.week7.3Shawn Rainbolt
 
Module 12 wireless
Module 12   wirelessModule 12   wireless
Module 12 wirelessxeroxk
 

Tendances (20)

Muo Network Manual
Muo Network ManualMuo Network Manual
Muo Network Manual
 
Classification of computer networks
Classification of computer networksClassification of computer networks
Classification of computer networks
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan security
 
Firewalls
FirewallsFirewalls
Firewalls
 
Network forensic
Network forensicNetwork forensic
Network forensic
 
FIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALAFIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALA
 
Info systems design and development
Info systems design and developmentInfo systems design and development
Info systems design and development
 
Campus Area Network Security
Campus Area Network SecurityCampus Area Network Security
Campus Area Network Security
 
Prensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection toolPrensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection tool
 
Presentation3 network
Presentation3 networkPresentation3 network
Presentation3 network
 
The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005
 
Network concepts and wi fi
Network concepts and wi fiNetwork concepts and wi fi
Network concepts and wi fi
 
Classification of computer network
Classification of computer networkClassification of computer network
Classification of computer network
 
shawn.rainbolt.it241.week7.3
shawn.rainbolt.it241.week7.3shawn.rainbolt.it241.week7.3
shawn.rainbolt.it241.week7.3
 
2 1 lan
2 1 lan2 1 lan
2 1 lan
 
Module 12 wireless
Module 12   wirelessModule 12   wireless
Module 12 wireless
 
Network Forensic
Network ForensicNetwork Forensic
Network Forensic
 
Network security at_osi_layers
Network security at_osi_layersNetwork security at_osi_layers
Network security at_osi_layers
 
Sniffer[1]
Sniffer[1]Sniffer[1]
Sniffer[1]
 
Osi model
Osi modelOsi model
Osi model
 

En vedette

Roofslides
RoofslidesRoofslides
Roofslidespenderj
 
Container Research
Container ResearchContainer Research
Container Researchpenderj
 
Sloanentertainingpresentationbeioct2009 091025222159 Phpapp01downloadreviseda...
Sloanentertainingpresentationbeioct2009 091025222159 Phpapp01downloadreviseda...Sloanentertainingpresentationbeioct2009 091025222159 Phpapp01downloadreviseda...
Sloanentertainingpresentationbeioct2009 091025222159 Phpapp01downloadreviseda...mprentice4
 
Roofslides
RoofslidesRoofslides
Roofslidespenderj
 
Roofslides
RoofslidesRoofslides
Roofslidespenderj
 
Behind The Scenes Databases And Information Systems 6
Behind The Scenes  Databases And Information Systems 6Behind The Scenes  Databases And Information Systems 6
Behind The Scenes Databases And Information Systems 6guest4a9cdb
 

En vedette (7)

Roofslides
RoofslidesRoofslides
Roofslides
 
Container Research
Container ResearchContainer Research
Container Research
 
Sloanentertainingpresentationbeioct2009 091025222159 Phpapp01downloadreviseda...
Sloanentertainingpresentationbeioct2009 091025222159 Phpapp01downloadreviseda...Sloanentertainingpresentationbeioct2009 091025222159 Phpapp01downloadreviseda...
Sloanentertainingpresentationbeioct2009 091025222159 Phpapp01downloadreviseda...
 
Roof
RoofRoof
Roof
 
Roofslides
RoofslidesRoofslides
Roofslides
 
Roofslides
RoofslidesRoofslides
Roofslides
 
Behind The Scenes Databases And Information Systems 6
Behind The Scenes  Databases And Information Systems 6Behind The Scenes  Databases And Information Systems 6
Behind The Scenes Databases And Information Systems 6
 

Similaire à Networking And Security5

Fa13 7718-ch7 9-singh
Fa13 7718-ch7 9-singhFa13 7718-ch7 9-singh
Fa13 7718-ch7 9-singhMary-Jo Apigo
 
L25 network fundamentals
L25   network fundamentalsL25   network fundamentals
L25 network fundamentalsheidirobison
 
Introduction To Networking
Introduction To NetworkingIntroduction To Networking
Introduction To Networkingtsmithnasd
 
Computer networks7
Computer networks7Computer networks7
Computer networks7Ali Raza
 
Computing safety
Computing safetyComputing safety
Computing safetyBrulius
 
computer networks
computer networks computer networks
computer networks MiXvideos
 
Network Sampoerna
Network SampoernaNetwork Sampoerna
Network Sampoernavjimmyfg
 
Fundamental Of Computer Network.
Fundamental Of Computer Network. Fundamental Of Computer Network.
Fundamental Of Computer Network. PushpendraSingh483
 
network fundamentals _Chapter 2 - Week 2and 3.pptx
network fundamentals _Chapter 2 - Week 2and 3.pptxnetwork fundamentals _Chapter 2 - Week 2and 3.pptx
network fundamentals _Chapter 2 - Week 2and 3.pptxmashfiqislam
 
Introduction to computer_networks (unit1)
Introduction to computer_networks (unit1)Introduction to computer_networks (unit1)
Introduction to computer_networks (unit1)Neha Kurale
 
Dcn introduction
Dcn introductionDcn introduction
Dcn introductionBaji Babu
 
Sample elements of computer networking
Sample elements of computer networkingSample elements of computer networking
Sample elements of computer networkingRameesh Paul
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber SecurityAnand Kater
 
Introduction to computer_networks
Introduction to computer_networksIntroduction to computer_networks
Introduction to computer_networksnitu kedia
 
Computer network & communication answer
Computer network & communication answerComputer network & communication answer
Computer network & communication answersmkengkilili2011
 

Similaire à Networking And Security5 (20)

Fa13 7718-ch7 9-singh
Fa13 7718-ch7 9-singhFa13 7718-ch7 9-singh
Fa13 7718-ch7 9-singh
 
L25 network fundamentals
L25   network fundamentalsL25   network fundamentals
L25 network fundamentals
 
Introduction To Networking
Introduction To NetworkingIntroduction To Networking
Introduction To Networking
 
Computer networks7
Computer networks7Computer networks7
Computer networks7
 
ISDD Networking & Connectivity
ISDD Networking & ConnectivityISDD Networking & Connectivity
ISDD Networking & Connectivity
 
Computing safety
Computing safetyComputing safety
Computing safety
 
computer networks
computer networks computer networks
computer networks
 
Network Sampoerna
Network SampoernaNetwork Sampoerna
Network Sampoerna
 
Fundamental Of Computer Network.
Fundamental Of Computer Network. Fundamental Of Computer Network.
Fundamental Of Computer Network.
 
network fundamentals _Chapter 2 - Week 2and 3.pptx
network fundamentals _Chapter 2 - Week 2and 3.pptxnetwork fundamentals _Chapter 2 - Week 2and 3.pptx
network fundamentals _Chapter 2 - Week 2and 3.pptx
 
Introduction to computer_networks (unit1)
Introduction to computer_networks (unit1)Introduction to computer_networks (unit1)
Introduction to computer_networks (unit1)
 
Dcn introduction
Dcn introductionDcn introduction
Dcn introduction
 
Dcn introduction
Dcn introductionDcn introduction
Dcn introduction
 
Sample elements of computer networking
Sample elements of computer networkingSample elements of computer networking
Sample elements of computer networking
 
Networks: The Big Picture
Networks: The Big PictureNetworks: The Big Picture
Networks: The Big Picture
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
Introduction to computer_networks
Introduction to computer_networksIntroduction to computer_networks
Introduction to computer_networks
 
Computer network & communication answer
Computer network & communication answerComputer network & communication answer
Computer network & communication answer
 
Computer networking
Computer networking Computer networking
Computer networking
 

Networking And Security5