/
Networks Topologies, Protocols and Layers Networks Topologies, Protocols and Layers

Networks Topologies, Protocols and Layers - PowerPoint Presentation

debby-jeon
debby-jeon . @debby-jeon
Follow
346 views
Uploaded On 2018-09-22

Networks Topologies, Protocols and Layers - PPT Presentation

Keywords Topology Mesh Network Star Network WiFi Encryption Ethernet Mesh and Star Networks Objectives BEGINNER I dentify a Star and Mesh Topology ADVANCED Compare Advantages and Disadvantages of WiFi and Ethernet ID: 675893

mesh star network encryption star mesh encryption network required compare data explain understand topology ethernetexpert disadvantages advantages advanced objectives beginner dentify networks

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "Networks Topologies, Protocols and Layer..." is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

Networks

Topologies, Protocols and Layers

Keywords

Topology, Mesh Network, Star Network, Wi-Fi, Encryption, EthernetSlide2

Mesh and Star Networks

Objectives

BEGINNER:

I

dentify

a Star and Mesh Topology

ADVANCED:

Compare

Advantages and Disadvantages of Wi-Fi and EthernetEXPERT: Understand and explain what encryption is and why it is required

Task 1

1. Draw a mesh network.

Task 2

1. Draw a star network.

2. Label the diagram.

2. Label the diagram.

3. Write down the features of a mesh network.

3. Write down the features of a star network. Slide3

Mesh Network

Objectives

BEGINNER:

I

dentify

a Star and Mesh Topology

ADVANCED:

Compare

Advantages and Disadvantages of Wi-Fi and EthernetEXPERT: Understand and explain what encryption is and why it is requiredSlide4

Star Network

Objectives

BEGINNER:

I

dentify

a Star and Mesh Topology

ADVANCED:

Compare

Advantages and Disadvantages of Wi-Fi and EthernetEXPERT: Understand and explain what encryption is and why it is requiredSlide5

Mesh and Star Networks

A Mesh Network is ….

Where some or all of the workstations or other devices are connected directly to each of other. Most are usually connected to the node that they exchange the most data with. 

A Star Network …..

In a star network, each device is connected by an individual cable directly to the server. Star networks are usually the layout of choice in schools and offices because they tend to be the most reliable of the topologies.

Objectives

BEGINNER:

I

dentify

a Star and Mesh Topology

ADVANCED:

Compare Advantages and Disadvantages of Wi-Fi and EthernetEXPERT: Understand and explain what encryption is and why it is requiredSlide6

Ethernet and

Wifi

Objectives

BEGINNER:

I

dentify

a Star and Mesh Topology

ADVANCED:

Compare Advantages and Disadvantages of Wi-Fi and EthernetEXPERT: Understand and explain what encryption is and why it is required

TASK

Write a list of benefits for Ethernet and a list of Wi-Fi.Slide7

Wi-Fi (Wireless Frequency)

Radio

waves are used to transmit data packets without the need for wires.

This

method is slower and more vulnerable to attack but it removes the need for cabling and

networks. This

means that it can be set up in remote locations such as in vehicles, in parks or on planes etc.

Objectives

BEGINNER:

Identify a Star and Mesh Topology

ADVANCED:Compare Advantages and Disadvantages of Wi-Fi and EthernetEXPERT: Understand and explain what encryption is and why it is requiredSlide8

Encryption

Encryption is a method of scrambling data with a key code which makes no

sense. On

an open or public

WiFi

network anyone can join and sniff out packets of data from other users.

Therefore encryption is used. If intercepted the data will have no

meaning. In

order to read the data the user is required to decrypt the data using the key.

When you are using a secure site for example your bank, or purchasing on Amazon, encryption applied to keep your details

safe. The encryption method used is called 'SSL' (Secure Socket Layer). A tiny padlock appears in your browser window, usally on the left hand side of the address bar and the website address starts with HTTPS://

ObjectivesBEGINNER:

Identify a Star and Mesh TopologyADVANCED:Compare Advantages and Disadvantages of Wi-Fi and EthernetEXPERT: Understand and explain what encryption is and why it is requiredSlide9

Example

Objectives

BEGINNER:

I

dentify

a Star and Mesh Topology

ADVANCED:

Compare

Advantages and Disadvantages of Wi-Fi and EthernetEXPERT: Understand and explain what encryption is and why it is required

Twitter users a HTTPS when you log in, why

?

Why

does the data need to be encrypted?What could happen if it was not encrypted?

What could happen if it was not encrypted?