Connectivity

Home Networking and Communication Protocols

HideShow resource information

Home Networks

Allows users to share an internet connection

Local Area Network (LAN)

- Shares internet

- Shares and backs up files

- Shares peripherals (Printers)

- Internet telephone services 

Router: Connects all computers to a modem and gives an internal IP address

You need a Network Interface Card (NIC) to connect computers to a network

1 of 8

Network Security

- Change the default admin password

- Set up a form of Encryption

- Set up MAC address filtering

- Stop the router broadcasting itself (its SSID)

- Turn off the router when not in use

- Reduce transmitting power

2 of 8

Bandwidth and Latency

Bandwidth: The numbers of bits that can go through the network conection in 1 second. (High Bandwidth is good)

Latency: The time in milliseconds between a bit leaving one device and arriving at another. (Low Latency is good)

3 of 8

Wifi and Mobile Broadband

Wifi

- Good range

- High Speed (54 Mbps)

- Widely available

- Hackers can set up fake WiFi hotspots

- Cant use if in not range of an access point

Mobile Broadband

- Greater Coverage than WiFi

- More secure - data is encrypted

- Have to pay for broadband and roaming charges

- Downloads limited

- Lower bandwidth than WiFi

4 of 8

Peer to Peer Networks

WiFi Direct

- Allows users to set up peer-to-peer networks with a Wireless Access Point

- Allows devices to use an access point for normal WiFi use

Bluetooth

- Allows devices to communicate automatically when in range

- Can connect up to 8 devices at once

- Low power so doesn't interfere with other devices

- Lower Bandwidth and Range than WiFi direct

5 of 8

Communication Protocol

VoIP: Voice Over Internet Porocol

POP3, IMAP, and SMTP are used when sending or recieving emails

POP3: Post Office Protocol, email is downloaded to computer and deleted from server and can be read offline

IMAP: Internet Message Access Protocol, Email is read on the server and is not deleted from the server so can be read anywhere using the internet

SMTP: Simple Mail Transfer Protocol, used when the email is sent from the email client (Outlook), to the senders email server and when the email is delievered to the recipients server.

6 of 8

Security Risks

Prevent remote access using a firewall. 
Firewalls: software which permits or blocks connections between computers according to rules you have set.

Some Malware works by shutting down the fairwall.

Precautions:

- Install AntiVirus

- Run regular scans

- Only download from trusted websites

- Only open email attachments from recognised senders

- Use Encryption

Stop illegal access by setting up a username and password on your network

7 of 8

Preventing Security Risks

- Lock computer

- Chains and Locks

- RFID chips

- Instal Burgular Alarms

- CCTV

- Require people entering building to authenticate identity

- Issue Swipe Cards

- Fit Blinds

- Use Biometrics

- Fits doors with security keypads

8 of 8

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Networks resources »