Week 1-3 Network Protocols + Topology & Security PDF
Document Details
Uploaded by GallantAntimony
Tags
Summary
This document provides an overview of network protocols, types of networks, and security measures.
Full Transcript
Network OBJECTIV ES : Define Network. Review some network types. Understand the basics of network protocols (IP, HTTP, HTTPS) WHAT IS NETWORK ? network is a group of devices connected together to share information and resources. RE...
Network OBJECTIV ES : Define Network. Review some network types. Understand the basics of network protocols (IP, HTTP, HTTPS) WHAT IS NETWORK ? network is a group of devices connected together to share information and resources. REVISION :TYPES OF NETWORKS INTRODUCTION TO NETWORK PROTOCOLS What are Protocols? Protocols are rules that allow computers to communicate. Think of them as the "languages" that computers speak. Why Are They Important? Without protocols, devices wouldn’t understand each other! IP (INTERNET PROTOCOL) What is IP? IP stands for Internet Protocol. It gives each device an “address” (like a home address) so that data knows where to go. Example: Every device on the internet has an IP address, like 192.168.1.1 ACTIVITY : find the IP address of your device HTTP AND HTTPS HTTP ( Hypertext Transfer Protocol ): is the set of rules that allows web browsers and servers to communicate and share information on the internet. HTTPS ( Secure HTTP ): Similar to HTTP, but with added security. The "S" stands for Secure, which means it protects your information on the web. ACTIVITY : List the differences between HTTP & HTTPS according to : 1. Accessing a Website 2.Logging into an Account 3.Browsing Sensitive Information Exit Ticket WHICH PROTOCOL IS THE STANDARD FOR WEBSITES WHERE PRIVACY IS IMPORTANT? LESSO N2 OBJECTIVES: 1 2 3 Review Network Define Compare and connections. Network Contrast Topology Topologies TYPES OF NETWORK CONNECTIONS Wired Connection Definition: A connection that uses physical cables to link devices to the Internet. Wireless Connection Definition: A connection that uses radio waves to link devices to the Internet without cables. WHAT IS NETWORK TOPOLOGY? Definition: The Importance: arrangement of Helps determine different elements how devices (devices, communicate and connections) in a the efficiency of network. data flow. TYPES OF NETWORK TOPOLOGIES Star Bus Topology Topology Ring Topolog y STAR TOPOLOGY Devices are connected to a central Device as switch or hub.. Like a star shape, each device is linked to the center. EXPLAIN THE PURPOSE OF A HUB AND A SWITCH IN A NETWORK. BUS TOPOLOGY : DEVICES ARE CONNECTED IN A STRAIGHT LINE (BUS). DATA TRAVELS ALONG THIS LINE TO REACH OTHER DEVICES. RING TOPOLOGY: DEVICES FORM A CIRCULAR PATH, WITH EACH DEVICE CONNECTED TO TWO OTHERS. DATA FLOWS IN ONE DIRECTION. HANDS-ON ACTIVITY: Building Our Human Network: Exploring Topologies Through Fun! SEARCH :COMPARE AND CONTRAST TOPOLOGIES Evaluate the advantages and disadvantages of each topology according to : - Speed. - Cost. - Ease of setup. - Reliability. REAL-LIFE USES: Star: Wi-Fi at school or home. Bus: Older networks or small offices. Ring: Special networks for industries. EXIT TICKET Draw It Out! Quickly draw and label one of the topologies you learned about today. LESSON 3 Objectives : OBJECTIV ES : Explain Network Security: Identify Security Measure WHAT IS NETWORK SECURITY? Definition: Network security involves protecting a computer network from intrusions, attacks, and unauthorized access. Importance: It safeguards sensitive information and ensures that only authorized users can access resources. WHY IS IT IMPORTANT? When you use the internet—whether to play games, watch videos, or chat with friends—your device connects to a network. If this network isn’t secure, hackers or bad actors could: Steal your personal information. Mess with your files. Pretend to be you online. 11/30/2024 32 COMMON THREATS TO NETWORK SECURITY Viruses and Malware: Malicious software that can harm your computer. Phishing: Tricks users into revealing personal information through fake emails or websites. Hacking: Unauthorized access to a network or device. ESSENTIAL SECURITY MEASURES: Firewalls: Act as barriers to block unauthorized access. Antivirus Software: Detects and removes malware. Encryption: Scrambles data to protect it during transmission. Strong Passwords: Use complex passwords to enhance security. TIPS FOR STAYING SAFE ONLINE Always use strong, unique passwords for different accounts. Be cautious with emails and links—verify sources before clicking. Regularly update software and security programs. Use secure connections (look for HTTPS in web addresses). DIGITAL PASSPORT : LET'S CHOOSE YOUR STRONG PASSWORD ! https:// www.digitalpassport.org ACTIVITY: Use an online encryption tool to encode and decode messages (e.g., Cryptii). Explain how encryption protects data during transmission. 11/30/2024 37 EXIT TICKET What is one common threat to network security that you learned about today? Name two security measures you can use to protect your information online. Why do you think using strong passwords is important?