3.3+Networks

=**3.3 Networks**=

Introduction
This topic addresses the role of networks in a range of different scenarios. Almost all businesses, institutions and organizations, and an increasing number of households, are linked by networks. The increasing use of networks raises a range of social impacts and ethical issues such as unauthorized access, intrusive software (viruses, worms and Trojan horses), spam, phishing, pharming, spoofing and identity theft. Students are expected to discuss possible solutions and evaluate their effectiveness.

Network technologies
• Client, host, server

• Mainframe, supercomputers • Grid computing, distributed processing • Ethernet, peer-to-peer (P2P) • Local area network (LAN), wide area network (WAN), virtual LAN (VLAN), wireless LAN (WLAN), home network • Internet, intranet, extranet, virtual private network (VPN) • Routers, switches, hubs • Connection types: optical fibre, cable, wireless technologies such as wireless fidelity (WiFi), worldwide interoperability for microwave access (WiMax), Bluetooth, microwave



• Network operating systems and utility software • Cloud computing • Storage technologies: for example, SAN (storage area network), RAID (redundant array of inexpensive disks)

Network functionality
• Protocols • Synchronous, asynchronous • Remote access • Bandwidth, broadband • Bit rates

Network administration
• Electronic security: for example, authorized access, levels of access, biometrics, login, password,

[] SSL - how it works.

firewalls, proxy server, encryption, secure socket layer (SSL), audit trails

• Licences: single-user, multi-user, concurrent, network, site • Physical Security for example loc ks
 * Physical security** is a form of network security and it involves prevent hackers or unauthorized people from accessing a facility. Examples of these include locking doors and having security guards.

• Monitoring: for example, keystroke monitoring, system performance, surveillance An example of network monitoring is keystroke monitoring which tracks the keys struck on the keyboard.
 * Network monitoring** "describes the use of a system that constantly monitors a computer network".



• Network policies: for example, backup, archiving, disaster recovery, usage, redundancy, failover
 * Network policies** are sets of conditions, constraints, and settings that allow you to designate who is authorized to connect to the network and the circumstances under which they can or cannot connect. Examples include:


 * Backup:** involves making copies of data which can be used when original data has been lost.


 * Disaster recovery:** “is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure critical to an organization after a natural or human-induced disaster.” – Wikipedia


 * Archiving:** Keeping documents or records of activities or people.

• Codes of ethics and professional conduct: for example, ACM (Association for Computing Machinery) · Contribute to society and human well-being. · Avoid harm to others. · Be honest and trustworthy.
 * Codes of ethics** are used to maximize the efficiency of an organization; an example would be ACM (Association for computing machinery):

Data centres "A **data center** (or data centre or datacenter) is a facility used to house computer systems and associated components, such as telecommunications and storage systems. It generally includes redundant or backup power supplies, redundant data communications connections, environmental controls (e.g., air conditioning, fire suppression) and security devices.” – Wikipedia

Energy usage, uninterruptable power supply (UPS) An **uninterruptible power supply**, also uninterruptible power source, UPS or battery/flywheel backup, is an electrical apparatus that provides emergency power to a load when the input power source, typically the utility mains, fails. A UPS differs from an auxiliary or emergency power system or standby generator in that it will provide instantaneous or near-instantaneous protection from input power interruptions by means of one or more attached batteries and associated electronic circuitry for low power users, and or by means of diesel generators and flywheels for high power users.

[] []

rss url="http://www.diigo.com/rss/user/weberguilherme" link="true" number="10"