File

advertisement
NETWORKS
AND THE
INTERNET
UNIT 11.3 C
LESSON OBJECTIVES
 Know the purpose of a
network
 Know the pros and cons
of a network
 Know the different types
of network topologies
STARTER ACTIVITY
http://www.bbc.co.uk/schools/gcsebitesize/ict/datacomm/2ne
tworks_act.shtml
MAIN ACTIVITY
http://www.bbc.co.uk/schools/gcsebitesize/ict/datacomm/2ne
tworksrev1.shtml
PLENARY ACTIVITY
http://www.bbc.co.uk/apps/ifl/schools/gcsebitesize/ict/qu
izengine?quiz=networks;templateStyle=ict
RESEARCH NOTES
Using BBC BITESIZE, take notes of the following
Give definitions of:
 BUS
 STAR
PROS & CONS of each topology
Draw a diagram of each type
 RING
Extension Task –
Give the reasons why networks are used
and explain the risks involved for large
organizations
WIKIBOOKS
1.
Why was ARPANET created?
2.
What is packet switching?
3.
What analogy can be used to explain packet switching?
4.
What is TCP/IP?
5.
Why do some countries try to restrict the use of the
internet?
6.
When has this happened recently?
7.
Give a definition of the World Wide Web.
8.
How is an intranet different from the internet?
9.
Describe a hyperlink and what it is used for.
10. Who is Tim Berners-Lee and what did he invent?
11. How is the internet different from the World Wide Web?
12. Explain what a router is and it’s function.
Structure_of_the_Internet_and_World_Wide_Web
PLATO’S DIALOGUE
 Using the research you have just carried out, write a script or a
dialogue that explains the theory you have just covered
 Make this into a conversation that explains the theory as easily as
possible - Make it accurate and correct
 DO NOT just repeat 12 questions and 12 answers
 Make it interesting and funny
NETWORK HARDWARE
TASK
For each network hardware device, create a
slideshow with one slide with:
 Title
 A description in your own words
 An image
http://www.teachict.com/gcse_computing/ocr/215_communications_networking/network_hard
ware/home_network_hardware.htm
NEXT…
Security
FTP - Protocols
Cloud computing & web
services
IP telephony
SECURITY –
HACKING & ENCRYPTION
 Know what hacking is
 Know how to crack
simple passwords
 Know how to make your
own passwords stronger
from attack
SECURITY –
HACKING & ENCRYPTION
Starter - in pairs:
1. Discuss what you think hacking is
and why people might like to do it?
2. Think of times when you have
heard about in the news. Discuss
these with the class.
3. How can hacking be prevented?
SECURITY –
HACKING & ENCRYPTION
How to hack a password
tutorial
http://www.youtube.com/watch?v
=97CdJFyAv1s
BECOMING A HACKER
1. Using the tips learned from watching the
video, I want to crack my password
2. You can use words from English
dictionary or any combination of letters or
numbers, UPPER CASE and lower case,
symbols and characters.
3. I will give you some key words to give you
a start
CLUES
These are the key words you can try
using a Brute Force attack:
cOMPUTER sCIENCE
ASTAna
school
KAZAKHSTAN
nAZARBAYEV
Any number from 1 - 9
MAKING PASSWORDS
STRONGER
1. Make a poster listing 3 rules to create
a secure password.
2. Explain system software such as
firewalls and anti-virus programmes
might help you be secure.
3. Use Publisher or any package of your
choice.
EXTENSION ACTIVITY – WIRELESS
SECURITY TASK
1. Name the pros and cons of using a wireless
network
2. Describe the hardware and software you would
need to crack wireless network password
3. Name three examples of code that you would need
to enter when attempting to crack a wireless
network
4. How long would it take you crack a wireless
network password? 1 day, 1 week, 1 year?
5. Can hacking ever be a good thing? How? Why?
Examples?
http://www.youtube.com/watch?v=jETwvEDaJeQ&featu
re=endscreen&NR=1
NETWORK HARDWARE TASK
 Title
 A description in your own words
 An image
http://www.teachict.com/gcse_computing/ocr/215_communications_networking/network_hard
ware/home_network_hardware.htm
MESH/
HYBRID
NETWORKS
TOPOLOGIES CONTINUED…
MESH/
HYBRID NETWORKS
 A mesh or hybrid network is many network
topologies combined to form one network
 It can span large distances
 It uses different types of topologies
 Allows faster transfer of data
 Uses more cabling than Star or Ring
 More Expensive
 More cabling and hardware is required
 More technicians may be required to install
and maintain it
MESH/
HYBRID NETWORKS
You are to be assigned into 3 groups to create 3 types
of topology:
 STAR
 RING
 BUS
Then you are will be given some extra pieces of
hardware to make a mesh network comprising all
three topologies
Hardware Devices:
Server Hub Bridge Router
CLOUD COMPUTING
Using the information from the video
clip, note 3 benefits and 3 drawbacks
for a cloud computing business and
home user
http://www.commoncraft.com/video/cl
oud-computing
CLOUD COMPUTING
Using the link below, answer these questions:
1. Give an example of where a server might be used:
2. What is a server and what is a client?
3. Describe the process involved in a web server
delivering a web page to a client:
4. Describe a situation where having a single server
and many client model might not work too well:
5. Name some example of web services in the cloud
Cloud Computing
PROTOCOLS…
FTP
HTTP
SMPT
POP
HTTPS
TCP/IP
PROTOCOLS NOTES AND
EXERCISES
1.
What is a protocol?
2.
What is a port number?
3.
Describe the different protocols and
explain their functions
http://en.wikibooks.org/wiki/Alevel_Computing/AQA/Computer_Components,_The_Stored_Program_
Concept_and_the_Internet/Structure_of_the_Internet/Protocols
HOME WORK FOR 1/11/2012
1.
What is a protocol?
2.
What is a port number?
3.
Describe the different protocols and explain their functions

Give your written answers on a neat piece of paper for
tomorrow’s lesson.

Write each question above each answer.

Include your name, date and title on each sheet of paper?
MAC ADDRESSING
1. Imagine that you a device (smart
phone, tablet, PC) connected to the
internet
2. You move location and your
connection to the internet changes
but you are still connected to the web
3. Your IP address had changed totally
but you are still connected to the web
4. How is the this possible?
MAC ADDRESSING &
THE IP STACK
Using the link below, read through the
notes on MAC Addressing and IP
Addresses and answer the questions
at the bottom of the page
http://en.wikibooks.org/wiki/Alevel_Computing/AQA/Computer_Components,_The_Stored_
Program_Concept_and_the_Internet/Structure_of_the_Intern
et/TCP/IP_protocol_stack
IP TELEPHONY
Investigate what VOIP (Voice over the
Internet Protocol) is and what it is used for
Make a one page poster using your
research
Make snappy (NO huge chunks of writing)
Make it visual
Make it colourful
Make it accurate and easy to understand
Download