3.3+Networks

=Strand 3: IT Systems= The student who is compling each set of notes is listed after the topic

3.3 Networks
Introduction: the topic addreses the role of networks in a range of different scenarios. Almost all businesses, institutions and organizations, and and increasing number of households, are linked by networks. the increasing use of networks raise a range of social impacts and thical issues such as unauthorised access, intrustiv software (viruses, worms and Trojan horses), spam, phishing, pharming, spoofing and identify theft. Students are expected to discuss possible solutions and evaluate their effectiveness.

IT concepts to address in this topic

Network Technologies

 * **Topic** || Student In Charge ||
 * Client, host, server || Chesi ||
 * Mainframe, supercomputers || EJ ||
 * Grid computing, distributed processing || Aqueel ||
 * Ethernet, peer to peer (P2P) || Andrea ||
 * LAN, WAN, virtual LAN, wireless WLAN, home network || Terence ||
 * Internet, intranet, extranet, virtual private network (VPN) || Chesi ||
 * Routers, switches, hubs || Kyle peverelle ||
 * Connectio types: Optical fibre, cable, wireless technologies such as wireless fidelity (WiFi), worldwide interoperability for microwave access (WiMax), Bluetooth, microwave ||  ||
 * @Network Operating systems and utility software || Trilok Patel ||
 * Cloud Computing || Kyle Peverelle ||
 * Storage technologies: for example SAN (storage area network), RAID (redundant array of inexpenxive disks) ||  ||

Network Functionality

 * Topic || Student in charge ||
 * Protocols || Kyle Peverelle ||
 * Synchronous/asynchronous || Terence ||
 * Remote Access || Chesi ||
 * Bandwidth, broadband || Andrea ||
 * Bit rates || EJ ||

Network Administration


 * Topic || Student in charge ||
 * Electronic security: for example, authorized access, levels of access, biometrics, login, password, firewalla, proxy server, encryption, secure socket layer (SSL), audit trails ||  ||
 * Licences: single user, multiuser, concurrent, network, site ||  ||
 * Physical security: for example locks || EJ ||
 * Monitoring; for example keystroke monitoring, system performance,surveillance ||  ||
 * Network policies: for example, backup archiving, diaster recovery, usage, redundancy, failover ||  ||
 * Codes of ethic ||  ||