Strand 3: IT Systems

The student who is compling each set of notes is listed after the topic

3.3 Networks

Introduction: the topic addreses the role of networks in a range of different scenarios. Almost all businesses, institutions and organizations, and and increasing number of households, are linked by networks.
the increasing use of networks raise a range of social impacts and thical issues such as unauthorised access, intrustiv software (viruses, worms and Trojan horses), spam, phishing, pharming, spoofing and identify theft. Students are expected to discuss possible solutions and evaluate their effectiveness.

IT concepts to address in this topic

Network Technologies

Topic
Student In Charge
Client, host, server
Chesi
Mainframe, supercomputers
EJ
Grid computing, distributed processing
Aqueel
Ethernet, peer to peer (P2P)
Andrea
LAN, WAN, virtual LAN, wireless WLAN, home network
Terence
Internet, intranet, extranet, virtual private network (VPN)
Chesi
Routers, switches, hubs
Kyle peverelle
Connectio types: Optical fibre, cable, wireless technologies such as wireless fidelity (WiFi), worldwide interoperability for microwave access (WiMax), Bluetooth, microwave

Network Operating systems and utility software
Trilok Patel
Cloud Computing
Kyle Peverelle
Storage technologies: for example SAN (storage area network), RAID (redundant array of inexpenxive disks)



Network Functionality


Topic
Student in charge
Protocols
Kyle Peverelle
Synchronous/asynchronous
Terence
Remote Access
Chesi
Bandwidth, broadband
Andrea
Bit rates
EJ

Network Administration

Topic
Student in charge
Electronic security: for example, authorized access, levels of access, biometrics, login, password, firewalla, proxy server, encryption, secure socket layer (SSL), audit trails

Licences: single user, multiuser, concurrent, network, site

Physical security: for example locks
EJ
Monitoring; for example keystroke monitoring, system performance,surveillance

Network policies: for example, backup archiving, diaster recovery, usage, redundancy, failover

Codes of ethic