### Understanding Network Topologies: Pros, Cons, and Functions ###
300 likes | 455 Vues
This lesson explores the fundamental concepts of networks, their purposes, and the various topologies such as Bus, Star, and Ring. Students will analyze the advantages and disadvantages of different network configurations, including Mesh and Hybrid networks. Through engaging activities and research tasks, learners will grasp the significance of packet switching, TCP/IP, and the essential components of network hardware. Additional focus will be on internet security, types of cyber threats, and best practices in creating strong passwords to safeguard networks. ###
### Understanding Network Topologies: Pros, Cons, and Functions ###
E N D
Presentation Transcript
Networks and the Internet Unit 11.3 C
Lesson Objectives • Know the purpose of a network • Know the pros and cons of a network • Know the different types of network topologies
Starter activity • http://www.bbc.co.uk/schools/gcsebitesize/ict/datacomm/2networks_act.shtml • MAIN ACTIVITY • http://www.bbc.co.uk/schools/gcsebitesize/ict/datacomm/2networksrev1.shtml • PLENARY ACTIVITY • http://www.bbc.co.uk/apps/ifl/schools/gcsebitesize/ict/quizengine?quiz=networks;templateStyle=ict
Research notes • Using BBC BITESIZE, take notes of the following • Give definitions of: • BUS • STAR • RING • Extension Task – • Give the reasons why networks are used and explain the risks involved for large organizations • PROS & CONS of each topology • Draw a diagram of each type
Wikibooks • Why was ARPANET created? • What is packet switching? • What analogy can be used to explain packet switching? • What is TCP/IP? • Why do some countries try to restrict the use of the internet? • When has this happened recently? • Give a definition of the World Wide Web. • How is an intranet different from the internet? • Describe a hyperlink and what it is used for. • Who is Tim Berners-Lee and what did he invent? • How is the internet different from the World Wide Web? • Explain what a router is and it’s function. Structure_of_the_Internet_and_World_Wide_Web
Plato’s dialogue • Using the research you have just carried out, write a script or a dialogue that explains the theory you have just covered • Make this into a conversation that explains the theory as easily as possible - Make it accurate and correct • DO NOT just repeat 12 questions and 12 answers • Make it interesting and funny
Network hardware task • For each network hardware device, create a slideshow with one slide with: • Title • A description in your own words • An image • http://www.teach-ict.com/gcse_computing/ocr/215_communications_networking/network_hardware/home_network_hardware.htm
Next… • Security • FTP- Protocols • Cloud computing & web services • IP telephony
Security – hacking & encryption • Know what hacking is • Know how to crack simple passwords • Know how to make your own passwords stronger from attack
Security – hacking & encryption • Starter - in pairs: • Discuss what you think hacking is and why people might like to do it? • Think of times when you have heard about in the news. Discuss these with the class. • How can hacking be prevented?
Security – hacking & encryption • How to hack a password tutorial • http://www.youtube.com/watch?v=97CdJFyAv1s
Becoming a hacker • Using the tips learned from watching the video, I want to crack my password • You can use words from English dictionary or any combination of letters or numbers, UPPER CASE and lower case, symbols and characters. • I will give you some key words to give you a start
clues • These are the key words you can try using a Brute Force attack: • cOMPUTERsCIENCE • ASTAna • school • KAZAKHSTAN • nAZARBAYEV • Any number from 1 - 9 You have 2 minutes!
Making Passwords stronger • Make a poster listing 3 rules to create a secure password. • Explain system software such as firewalls and anti-virus programmes might help you be secure. • Use Publisher or any package of your choice.
Extension activity – wireless security task • Name the pros and cons of using a wireless network • Describe the hardware and software you would need to crack wireless network password • Name three examples of code that you would need to enter when attempting to crack a wireless network • How long would it take you crack a wireless network password? 1 day, 1 week, 1 year? • Can hacking ever be a good thing? How? Why? Examples? • http://www.youtube.com/watch?v=jETwvEDaJeQ&feature=endscreen&NR=1
Network hardware task • For each network hardware device, create a slideshow with one slide with: • Title • A description in your own words • An image • http://www.teach-ict.com/gcse_computing/ocr/215_communications_networking/network_hardware/home_network_hardware.htm
MESH/HYBRIDNETWORKS TOPOLOGIES CONTINUED…
MESH/HYBRID NETWORKS • A mesh or hybrid network is many network topologies combined to form one network • It can span large distances • It uses different types of topologies • Allows faster transfer of data • Uses more cabling than Star or Ring • More Expensive • More cabling and hardware is required • More technicians may be required to install and maintain it
MESH/HYBRID NETWORKS • You are to be assigned into 3 groups to create 3 types of topology: • STAR • RING • BUS • Then you are will be given some extra pieces of hardware to make a mesh network comprising all three topologies • Hardware Devices: • Server HubBridgeRouter
research the meaning of HTTP error codes 200, 403, 404, 500, 503 Protocol Extension activities
Cloud computing THE CLOUD • Using the information from the video clip, note 3 benefits and 3 drawbacks for a cloud computing business and home user • http://www.commoncraft.com/video/cloud-computing
Cloud computing • Using the link below, answer these questions: • Give an example of where a server might be used: • What is a server and what is a client? • Describe the process involved in a web server delivering a web page to a client: • Describe a situation where having a single server and many client model might not work too well: • Name some example of web services in the cloud • Cloud Computing
Protocols… • FTP • HTTP • SMPT • POP • HTTPS • TCP/IP
Protocols notes and exercises • What is a protocol? • What is a port number? • Describe the different protocols and explain their functions • http://en.wikibooks.org/wiki/A-level_Computing/AQA/Computer_Components,_The_Stored_Program_Concept_and_the_Internet/Structure_of_the_Internet/Protocols
Home Work for 1/11/2012 • What is a protocol? • What is a port number? • Describe the different protocols and explain their functions • Give your written answers on a neat piece of paper for • tomorrow’slesson. • Write each question above each answer. • Include your name, date and title on each sheet of paper?
research the meaning of HTTP error codes 200, 403, 404, 500, 503 Protocol Extension activities
MAC ADDRESSING • Imagine that you a device (smart phone, tablet, PC) connected to the internet • You move location and your connection to the internet changes but you are still connected to the web • Your IP address had changed totally but you are still connected to the web • How is the this possible?
MAC ADDRESSING & the IP stack • Using the link below, read through the notes on MAC Addressing and IP Addresses and answer the questions at the bottom of the page • http://en.wikibooks.org/wiki/A-level_Computing/AQA/Computer_Components,_The_Stored_Program_Concept_and_the_Internet/Structure_of_the_Internet/TCP/IP_protocol_stack
IP TELEPHONY GIVE EXAMPLES OF SOFTWARE USED EVERYDAY • Investigate what VOIP (Voice over the Internet Protocol) is and what it is used for • Make a one page poster using your research • Make snappy (NO huge chunks of writing) • Make it visual • Make it colourful • Make it accurate and easy to understand