3.3+Networks

=3.3 Networks=

This topic addresses the role of networks in a range of different scenarios. Almost all businesses, institutions and organizations, and an increasing number of households, are linked by networks.

The increasing use of networks raises a range of social impacts and ethical issues such as unauthorized access, intrusive software (viruses, worms and Trojan horses), spam, phishing, pharming, spoofing and identity theft. Students are expected to discuss possible solutions and evaluate their effectiveness.

Possible scenarios to address:

An organization is considering developing a network to facilitate the sharing and transfer of information. The student must use their knowledge to demonstrate an understanding of: • the types of networks that exist and the specific scenarios where they are used • the development of an acceptable-use policy for a network • the protocols that exist to ensure compatibility within and between networks • the ways in which the effectiveness of a network may be measured • the impacts that the ineffective management and network failure can have for many organizations.Syllabus content

Network technologies key terms: • Client, host, server • Mainframe, supercomputers • Grid computing, distributed processing • Ethernet, peer-to-peer (P2P) • Local area network (LAN), wide area network (WAN), virtual LAN (VLAN), wireless LAN (WLAN), home network • Internet, intranet, extranet, virtual private network (VPN) • Routers, switches, hubs • Connection types: optical fibre, cable, wireless technologies such as wireless fidelity (WiFi), worldwide interoperability for microwave access (WiMax), Bluetooth, microwave • Network operating systems and utility software • Cloud computing • Storage technologies: for example, SAN (storage area network), RAID (redundant array of inexpensive disks)

Network functionality key terms: • Protocols • Synchronous, asynchronous • Remote access • Bandwidth, broadband • Bit rates

Network administration key terms: • Electronic security: for example, authorized access, levels of access, biometrics, login, password, firewalls, proxy server, encryption, secure socket layer (SSL), audit trails • Licenses: single-user, multi-user, concurrent, network, site • Physical security: for example, locks • Monitoring: for example, keystroke monitoring, system performance, surveillance • Network policies: for example, backup, archiving, disaster recovery, usage, redundancy, failover • Codes of ethics and professional conduct: for example, ACM (Association for Computing Machinery) • Data centres • Energy usage, uninterruptible power supply (UPS)


 * LEARNING GOALS**
 * DESCRIBE the roles performed by computers on a network.
 * DISTINGUISH PAN, LAN, MAN, and WAN networks.
 * DESCRIBE the types of LAN networks which exist.
 * EXPLAIN the ways computers can connect to a network.
 * EXPLAIN how computers communicate on a network.
 * EXPLAIN how network performance can be monitored.
 * EXPLAIN the impacts of network failure.

ITGS 3.3 Key Terms
 * LEARNING RESOURCES**

http://itgsopedia.wikispaces.com/3.3+Networks http://www.itgstextbook.com/chapter4-networks.html#components @http://www.igcseict.info/theory/topics/index.html @http://www.gcsecomputing.org.uk/support/network/NWB_SIM.swf @http://www.telegeography.com/telecom-resources/map-gallery/index.html media type="custom" key="28361787"
 * Below is a "Study Stack" interactive activity that features different games the user can play to study relevant ITGS terminology for 3.3 Networks. Click on the image to play the interactive activity.**

media type="custom" key="24869660"

media type="custom" key="24869670"

media type="custom" key="24869688"

media type="custom" key="24869696"

Required Reading Information Technology in a Global Society, Stuart Gray. 1st Edition. © 2012 Stuart Gray. ISBN 9781468023619. Pages 68-86 This textbook has been developed independently of the International Baccalaureate ® This book was written specifically for the ITGS course, covering technical systems, social impacts and ethical issues, and each area of application.

Digital Planet: Tomorrow’s Technology And You, George and Ben Beekman. 10th Edition. © 2012 Pearson Education. ISBN 9780132091251. Pages 270-313 This book explains how various technologies work, how they are used to solve problems and extend human capabilities, and how our ever-growing network of digital devices affect our lives, our world, and our future.

How to prepare for 3.3 (Paper 1 Style) Assessment
 * Study all content covered in the books, learning activities, and especially-key terms.
 * Read details about Paper 1 in ITGS Guide pages 46-52 (see parts relevant to Paper 1).

Tips for 3.3 (Paper 1 Style) Assessment
 * Read each scenario and be sure to answer the question while using command terms.
 * Use a formal style of writing with good spelling and grammar. Bullet points do not have depth and paragraph/sentence style is better. Avoid symbols and words such as:
 * --> (used in math meaning if...then), do not use in writing
 * etc. (worth no marks)
 * & (write out 'and')
 * Avoid SMS-speak ('u' instead of 'you' and other instances)
 * misspelling words that appear in the question or misspelling ITGS words
 * phrases such as 'it is obvious' contributes nothing to the argument
 * Look for the Triangle in the scenario. Underline Command Terms and bold [|Key Terms].
 * Organize responses before writing. Include ITGS terminology (Key Terms) and provide specific examples with description and explanations as required by the Command Term.

media type="custom" key="28433291" Recent Articles @http://www.nytimes.com/2014/01/07/opinion/nocera-will-digital-networks-ruin-us.html?_r=1 @http://bits.blogs.nytimes.com/2014/01/14/the-nuts-and-bolts-of-network-neutrality/?ref=technology @http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-connected-to-internet.html?_r=0 @http://www.bbc.co.uk/news/technology-25743200 @http://socialmediatoday.com/irfan-ahmad/1882896/wrapped-priorities-information-age-how-masses-misuse-social-media-infographic @http://bits.blogs.nytimes.com/2013/10/26/teens-prove-fickle-when-choosing-their-favorite-social-network/ @http://news.cnet.com/8301-1035_3-57617227-94/so-who-has-the-superior-wireless-network-anyway/ http://www.latimes.com/nation/nationnow/la-na-nn-supreme-court-tv-streaming-20140110,0,2228237.story#axzz2qU185U16 @http://www.usnews.com/news/articles/2014/01/10/google-links-social-network-to-email

3.3A GUIDED LEARNING ACTIVITIES Complete 3.3A as directed on the 3.3A template.
 * ASSIGNMENTS**

HOMEWORK Study the learning resources provided for Strand 3.3 Networks (ITGSopedia Wiki).

B. Read Pages 68-86 (ITGS). Complete HW 3.3B. Bold Key Terms. Submit via Edmodo (HW 3.3B). C. Read Pages 270-313 (Digital Planet). Complete HW 3.3C. Bold Key Terms. Submit via Edmodo (HW 3.3C). D. Think Pair Share Recent Article Activity. Find 3 related and recent news articles from reliable news sources. Prepare a brief one minute EXPLANATION for each article to share during class. After sharing post the link to ONE of the articles you found to Edmodo (3.3 Recent Article Think Pair Share post). Choose ONE article posted by another student and complete a triangle analysis with the provided template. Bold Key Terms. Save as HW 3.3D. Submit via Edmodo (HW 3.3D). E. Quizlet Key Terms test. Use the Quizlet widgets below to study the Key Terms for strand 3.3. Take the 72 item Quizlet test for this section. When you are satisfied with your score save a .pdf of your screen documenting your results as 3_3KT. (File>Print>PDF, Save) Submit via Edmodo (3.3 KT).

Networks: Key Terms Quizlet Activities media type="custom" key="24870028"

F. 3.3 (Paper 1 Style) Assessment