Network simulation.
READ:
GOF 2.5.2 "Encryption" (pp 96-98)
GOF 5.3 Identity theft and Credit Card Fraud (pp. 250-257)
GOF 5.3.3 "Biometrics" (pp. 257-258)

Network Technologies

  • Cloud Computing
  • Installing a Home Network (Sound Byte)
  • Connecting with Bluetooth (Sound Byte)
  • Network Topology & Navigation Devices (Sound Byte)
  • Client, host, server
  • Mainframe, supercomputers
  • Grid computing, distributed processing
  • Ethernet, peer-to-peer (P2P)
  • Local area network (LAN), wide area network (WAN), virtual LAN (VLAN), wireless LAN (WLAN), home network
  • Internet, intranet, extranet, virtual private network (VPN)
  • Routers, switches, hubs
  • Connection types: optical fibre, cable, wireless technologies such as wireless fidelity (WiFi), worldwide
  • interoperability for microwave access (WiMax), Bluetooth, microwave
  • Network operating systems and utility software
  • Storage technologies: for example, SAN (storage area network), RAID (redundant array of inexpensive
  • disks)


Ring Topology


How to Set up a Home Network


Switches and Hubs

Network Functionality/Administration

Securing your Wireless Network (soundbyte)
Firewalls
SSL (Secure Socket Layer)



• Protocols
• Synchronous, asynchronous
• Remote access
• Bandwidth, broadband
• Bit rates
• Electronic security: for example, authorized access, levels of access, biometrics, login, password,
firewalls, proxy server, encryption, secure socket layer (SSL), audit trails
• Licences: single-user, multi-user, concurrent, network, site
• Physical security: for example, locks
• Monitoring: for example, keystroke monitoring, system performance, surveillance
• Network policies: for example, backup, archiving, disaster recovery, usage, redundancy, failover
• Codes of ethics and professional conduct: for example, ACM (Association for Computing Machinery)
• Data centres
• Energy usage, uninterruptable power supply (UPS)