3.3+Networks

=SL/HL Core= =Networks= Introduction The increasing use of networks raises a rnage of social impacts and ethcial issues such as unauthorized access, intrusive software (Viruses,worms, and Trojan horses), spam, phishing, pharming, spoofing and identity theft. Students are expected to iscuss possible solutions and evaluate their effectiveness.

Objectives Students should be able to use their knowledge to demonstrate an understanding of
 * The types of networks that exist and the specific scenarios where they are used
 * The developmetn of an acceptable -use polciy for a network
 * The protocols that exist to ensure compatiltility within and between networks
 * The ways in which the effectiveness of a network may be measured
 * The impacts that the ineffective managemnet and network failure can have for many organisations.

3 Main Areas of study
 * Network technologies
 * Network Functionality
 * Network Administration

Evacuation map by 20 needed || For Homework  Recording artists are divided on the issue of P2P file sharing. Discuss this issue in relation to home and leisure? || Lesson 1 []Protects consumers || [] [] || Download file and fill in the blanks. 3 or 4 sentences at least for each blank box. After completing exercise see page 288/289 in Beekman for how a home network works. soem good voacbulary there. || Network Functionality Hub V Switch See Video || Q What is the difference between MB and mB? Q Mix and match exercise on network words || Tomorrows Technology and You (Beekman) pages 288/289 || Encryption page 374 Beekman How a firewall works Video || Powerpointv6 to go in here when finished || Quizlet Power point activity || Tomorrows Technology and You (Beekman) pages 373/374 || Studnets to look up a newspaper article and share it in class with each other, they then pick out 10-15 keywords related to cloud computing only. ||
 * Cycle || Lesson 1 single || Lesson 2 Double || Lesson 3 Double || Resources ||
 * 9 || [[file:3.3 networks v1.2.pptx]] || Tour of the school network
 * 10 || [[file:3.3NetworksP2Panswerv2.docx]] || [[file:3.3 networksv2ethicalissues.pptx]] || [[image:bmisitgsclass2011-12/3.3networksAndrew_Olmsted.jpg width="127" height="192" align="center"]] || **Websites needed**
 * 11 || Types of Network
 * 12 || Firewalls page 373 Beekman
 * 13 || Exam || Correct Exam || Videos on Utube on cyber crime ||  ||
 * 14 || Cloud Computing

Fill in the power point exercise and then 4 people will present to the class ||  ||   ||

Viruses Phishing Pharming Spoofing Identify Thef || P2P Bit-Torrent Processor Sharing Grid Computing Volunteer computing Utility computing Cloud computing Lurkers/Monitors Wi-Fi (See Video) || Skype Email Instant messaging Blogging Teleconferencing Online communication Avatars Web Forums E-commerce || WAN VLAN wireless Wan Home network Mesh Netowrks Routers What are the different types of Routers on the market and what is the difference? || Internet Intranet Extranet V.P.N. Secure tunnels || Network Functionality Hub Traditional Ethernet Bus topology Wastes bandwidth Security problem Data collision Switch LAN can become intelligent Mac Address Mac address table Port: Parallel, Serial, and USB Full duplex populating Micro segmentation || Firewall || Modem POTS DSL Cable connection Satelitte connection WIFI WiMAx Bluetooth 3G || TCP/IP Protocols || Super computer Mainframe Server Host Client P2P networking Ethernet (See Video) Grid computing Distributed computing ||  || Cloud Provider Cloud Sourcing Cloud Providing SaaS HaaS IaaS PaaS Elasting computing || Amazon EC2 Cloud Book ICloud Shared Data Center No upgrades for the user Enterprise Cloud Computing Capex Opex || Desktop-cloud Hybrid ||  ||   ||
 * Cycle || Name || word 1 || Word 2 || Word 3 || Word 4 ||
 * Cycle 9 || Mr. O || Intrusive software
 * worms
 * Trojan || Spam
 * Cycle 10 ||  || LAN
 * Software
 * Hardware
 * Multiple ISP Routers
 * Protocols
 * synchronous, asynchronous
 * Remote access
 * Bandwidth, broadband
 * Bit rates || Switch V Router
 * Cycle 11 || WEB
 * Cycle 12 || Open source ||  ||   ||   ||   ||
 * Cycle 13 ||  ||   ||   ||   ||   ||
 * Cycle 14 || Cloud Computing
 * Cycle 9 || Arthur || V.P.N || Phishing || Pharming ||  ||
 * Cycle 10 || Arthur || P2P || Spoofing || Spam ||  ||
 * Cycle 11 || Arthur || Supercomputer || Host || Mainframe ||  ||
 * Cycle 12 || Arthur || Linden Scripting Language || Audit Trails || Botnet  ||   ||
 * Cycle 13 || Arthur || Zombie (computers) || Computer Worms || Spamdexing  ||   ||
 * Cycle 9 || Xana || WAN || LAN || Skype ||  ||
 * Cycle 10 || Xana || Intranet || Identity theft || Extranet ||  ||
 * Cycle 11 || Xana || WIFI || Bluetooth || P2P networking ||  ||
 * Cycle 12 || Xana || Cyber Crime || Zombie computers || Webjackers ||  ||
 * Cycle 13 || Xana || Antivirus || Malware || Spybot ||  ||
 * Cycle 9 || Lukas || Repeater || Network Topology || Network Overlay ||  ||
 * 10 ||  || Overlay Network || Repeater || Network Topology ||   ||
 * 11 ||  ||   ||   ||   ||   ||
 * 12 ||  ||   ||   ||   ||   ||
 * Cycle 9 || Natasha || Instant Messaging || Teleconferencing ||  ||   ||
 * Cycle 10 || Natasha || VLAN || Protocols ||  ||   ||
 * Cycle 11 || Natasha || Bus Topology || Hub ||  ||   ||
 * Cycle 12 || Natasha || Spammer || Firewalls ||  ||   ||
 * Cycle 13 || Natasha || Spyware || Security Patches ||  ||   ||
 * Cycle 9 || Bill || Cloud computing || A Router || Software router ||  ||
 * Cycle 10 ||  || Multiple ISP Routers || Secure tunnels || Network Functionality ||   ||
 * Cycle 11 ||  || Protocols || Synchronous, Asynchronous || Remote access ||   ||
 * Cycle 12 ||  || Bandwidth, broadband || Bit rates ||   ||   ||
 * Cycle 13 ||  ||   ||   ||   ||   ||
 * Cycle 9 || Edward || Worms || Trojan || Spoofing ||  ||
 * Cycle 10 ||  || WLAN || Lurkers/Monitors || Intrusive Software ||   ||
 * Cycle 11 ||  ||   ||   || Micro Segmentation ||   ||
 * Cycle 12 ||  ||   ||   ||   ||   ||
 * Cycle 13 ||  ||   ||   ||   ||   ||
 * Cycle 9 || Mahomed || P2P || Avatars || E-Commerce || Blog ||
 * Cycle 10 ||  || Intranet || Bit-torrent || Instant Messaging || Virus: Trojan ||
 * Cycle 11 ||  || WiMaX || Bluetooth || Mesh Networking || 3G ||
 * Cycle 12 ||  || WAN || Home Network || WLAN  || VLAN ||
 * Cycle 13 ||  || ILOVEYOU virus || MELLISA || STORM WORM || SQL Slammer ||
 * cycle 10 || Jordan || Web Forums || Multiple ISP Routers || Bit rates ||  ||
 * cycle 11 ||  || TCP/IP Protocols || Full duplex populating ||   ||   ||
 * cycle 12 ||  || Open source || Host || Server ||   ||
 * cycle 9 || joschka || Blogging || Grid computing || volunteer computing ||  ||
 * cycle 10 ||  || utility computing || bandwidth ||   ||   ||
 * cycle 11 ||  || Distributed computing || Client || Satelitte connection ||   ||
 * cycle 12 ||  ||   ||   ||   ||   ||
 * Cycle 9 || Hun Baek || Spam || Bit-Torrent || Cloud Computing ||  ||
 * Cycle 10 ||  ||   ||   ||   ||   ||
 * Cycle 11 ||  ||   ||   ||   ||   ||
 * Cycle 12 ||  ||   ||   ||   ||   ||
 * Cycle 13 ||  ||   ||   ||   ||   ||
 * || safwan master ||  ||   ||   ||   ||
 * cycle 10 ||  || synchronous || Mesh Netowrks || Cloud computing ||   ||
 * cycle 11 ||  ||   ||   ||   ||   ||
 * cycle 13 ||  || Micro Virus || Hackers || Firewalls ||   ||
 * cycle 13 ||  || Decryption ||   ||   ||   ||
 * Cycle 9 || Hussein Nathanie || Micro- Targeting || Power Line Networks || Backbone Net ||  ||
 * Cycle 10 ||  || Digital Signal || Analog Signal || Digital suscriber Line(DSL) ||   ||
 * Cycle 11 ||  || Gigabit Ethernet || Cat5 cables || fiber optic cables ||   ||
 * Cycle 12 ||  || Personal Area Network (PAN) || Drive by downloads || Mafia boy || Decryption ||
 * Cycle 13 ||  || Wireless Access Point || Virtual Private Network (VPL) || Intranet ||   ||
 * Cycle9 || Hassan Mlaida || Bit rate || Phishing || Protocols ||   ||
 * Cycle 10 ||  || Remote access || Teleconfrencing || Pharming ||   ||
 * Cycle 11 ||  || Bluetooth  || Extranet || Wimax ||   ||
 * cycle 12 ||  || Spybot  || RAID || Encryption  ||   ||
 * cycle9 || pempho kusani ||  ||   ||   ||   ||
 * cycle10 ||  ||   ||   ||   ||   ||
 * cycle11 ||  ||   ||   ||   ||   ||
 * cycle 12 ||  ||   ||   ||   ||   ||
 * cycle13 ||  ||   ||   ||   ||   ||
 * Cycle 9 || Hussein Nathanie || Micro- Targeting || Power Line Networks || Backbone Net ||  ||
 * Cycle 10 ||  || Digital Signal || Analog Signal || Digital suscriber Line(DSL) ||   ||
 * Cycle 11 ||  || Gigabit Ethernet || Cat5 cables || fiber optic cables ||   ||
 * Cycle 12 ||  || Personal Area Network (PAN) || Drive by downloads || Mafia boy || Decryption ||
 * Cycle 13 ||  || Wireless Access Point || Virtual Private Network (VPL) || Intranet ||   ||
 * Cycle9 || Hassan Mlaida || Bit rate || Phishing || Protocols ||   ||
 * Cycle 10 ||  || Remote access || Teleconfrencing || Pharming ||   ||
 * Cycle 11 ||  || Bluetooth  || Extranet || Wimax ||   ||
 * cycle 12 ||  || Spybot  || RAID || Encryption  ||   ||
 * cycle9 || pempho kusani ||  ||   ||   ||   ||
 * cycle10 ||  ||   ||   ||   ||   ||
 * cycle11 ||  ||   ||   ||   ||   ||
 * cycle 12 ||  ||   ||   ||   ||   ||
 * cycle13 ||  ||   ||   ||   ||   ||
 * cycle11 ||  ||   ||   ||   ||   ||
 * cycle 12 ||  ||   ||   ||   ||   ||
 * cycle13 ||  ||   ||   ||   ||   ||