Beruflich Dokumente
Kultur Dokumente
Melinda Hicks
11416723
Assignment 3
EMT443
Curriculum Method 1: Information Technology
Lecturer: Andrejs Kristovskis
Due: 11th October 2010
Melinda Hicks
11416723
EMT443
Melinda Hicks
11416723
Context:
This option introduces the nature of networking systems. File management, users and
groups for any operating system are investigated. Students gain hands-on experience with
setting up servers and protocols in a network environment.
Module Focus:
This module will be a project-based unit of study, where students learn about Networking
System features and design, as well as sections of the core topics. The continual
assignment throughout the duration of study will encourage students to learn and give
them a real life scenario in which to interact with.
Target Outcomes:
Core Outcomes
5.1.1 Selects and justifies the application of appropriate software programs to a range of
tasks
5.1.2 Selects, maintains and appropriately uses hardware for a range of tasks
5.3.2 Acquires and manipulates data and information in an ethical manner
5.4.1 Analyses the effects of past, current and emerging information and software
technologies on the individual and society
5.5.1 Applies Collaborative work practices to complete tasks
5.5.2 Communicates ideas, processes and solutions to a target audience
Option Outcomes
5.2.1 Describes and Applies problem-solving processes when creating solutions
5.2.2 Designs, produces and evaluates appropriate solutions to a range of challenging
problems
5.2.3 Critically analyses decision-making processes in a range of information and software
solutions
2
EMT443
Melinda Hicks
11416723
Resources List:
Numbe
r
1
Resource
Source/Materials
(See Appendix 1)
http://www.youtube.com/watch?
v=U6TX4Zbu2ao&feature=related
http://www.youtube.com/watch?
v=oVOeNcJJYos&feature=related
http://www.youtube.com/watch?
v=aNxxrawNu48&feature=related
(See Appendix 4)
http://www.youtube.com/watch?
v=sYOXtIl_lO0
http://www.youtube.com/watch?
v=ykuRokSgRIU&feature=related
http://www.youtube.com/watch?
v=C2Ovabby7zw
2
3
10
11
12
13
16
17
18
19
20
21
22
14
15
(See Appendix 2)
(See Appendix 3)
(See Appendix 5)
(See Appendix 6)
(See Appendix 7)
http://www.youtube.com/watch?
v=RbY8Hb6abbg&feature=related
http://www.youtube.com/watch?
v=Wc1dOw4j3J8
(See Appendix 8)
http://www.youtube.com/watch?
v=Wc1dOw4j3J8
(See Appendix 9)
http://www.youtube.com/watch?
v=_E4DO4ADCqw&feature=related
(See Appendix 10)
EMT443
23
24
25
26
27
28
29
30
31
Melinda Hicks
11416723
http://www.youtube.com/watch?
v=CKOZMfFE1cI
http://www.youtube.com/watch?
v=BZ6WCqRb_us&NR=1
(See Appendix 11)
http://www.youtube.com/watch?
v=z4vDClhnJjs
http://www.youtube.com/watch?
v=nH4GoXEoiSc
(See Appendix 15)
P 189-214
P 287-312
P167-189
P 147-177
Chapter 13
EMT443
Melinda Hicks
11416723
SYMBOL
SENARIO: A business owner has purchased another building on the second floor across
the road from his current ground floor office. He wants to network both the offices in the
cheapest and most effective way possible. In the ground floor office he has 5 employees
and in the second story office across the road he has 4 employees. The business makes
use of telephones and fax machines along with printing, scanning and photocopying
devices and relies heavily on the internet.
Teacher Setting Assignment: Miss Hicks
EMT443
Melinda Hicks
11416723
Marks
61 - 80
41 - 60
21 - 40
0 - 20
EMT443
Lesson Number
Lesson 1Introduction to
Communications
Networks
Melinda Hicks
Content
Students learn about:
- Nature and role of a
communications network
- The impact of past, current
and emerging technologies
on the individual and
society
11416723
Skills
Students learn to:
- Describe the nature and
role of a communications
network
Teac
-
As a cl
ideas a
and ho
board
books.
about
know.
On the
social
transm
interne
Compo
a stud
board
studen
networ
everyd
topic t
Give st
and Em
Worksh
individ
to eng
of lear
copy o
learnt.
Review
over a
Reinfo
studen
they h
unders
EMT443
Lesson Number
Lesson 2Communications
Networks
Melinda Hicks
Content
Students learn about:
- Advantages and
disadvantages of a
communication network
such as
- Sharing of peripheral
devices
- Application programs
- Data
- Security of
information
- Access to databases
Lesson Number
Content
Lesson 3- Client
server and peer-peer
networks
11416723
Skills
Students learn to:
- Discuss the advantages
and disadvantages of
establishing a network
Teac
-
With s
what w
previo
learnin
studen
previo
basic u
work.
Play a
whispe
an issu
networ
Draw t
discus
advant
disadv
and es
to be c
books.
self lea
que fo
positiv
networ
Give st
Worksh
individ
studen
of lear
hard c
to revi
Review
over a
Ensure
right id
Hand o
and Ma
have a
Skills
Students learn to:
- Compare a client/server
network with a peer-peer
network
Teac
-
Discus
Contra
peer-p
studen
studen
EMT443
Melinda Hicks
11416723
work b
studen
thems
whilst
Lesson 4Components of
Networks
Lesson Number
Lesson 5Components of
Networks
Content
Students learn about:
- Components of Networks
such as
- Servers-file sharing
servers
- Print servers
- Mail servers
- Workstations
- Hubs
- Switches
- Routers
- Gateways
- Repeaters
- Bridges
Cooperati
- studen
investi
networ
diagra
examin
and re
their in
- Go thr
compo
course
allowin
in work
studen
unders
networ
Cooperati
- Split st
giving
pair ha
words,
the pu
and em
Allows
and un
for the
-
Ask stu
glossa
Restric
followi
Teac
Play D
Game
the pre
Reinfo
studen
Skills
Students learn to:
- Describe and compare
servers for a particular
network
- Download and upload files
to a host
- Describe the purpose of
network connectivity
devices
Cooperati
- Split st
chose
group
a poste
for tha
9
EMT443
Melinda Hicks
-
Lesson 6Components of
Networks
11416723
Network interface
card
10
online
comple
lesson
engag
take co
Studen
poster
for par
be com
and pr
lesson
EMT443
Lesson Number
Lesson 7Components of
Networks
Lesson 8- Network
Topology
Melinda Hicks
Content
11416723
Skills
Teac
-
Studen
poster
compa
particu
Studen
others
in self
learnin
compo
Revisio
Restric
glossa
Reinfo
learnin
Watch
introdu
shows
topolo
Discus
identif
and di
studen
work b
any m
Watch
introdu
shows
topolo
ring to
Discus
identif
and di
studen
work b
any m
Watch
introdu
visuall
in the
previo
Discus
identif
and di
11
EMT443
Melinda Hicks
11416723
studen
work b
any m
-
Get stu
illustra
each n
Reinfo
gives s
of thei
Lesson 9Assignment
Development
Remin
their a
followi
(prepa
lesson
Scaffolded
- Revisio
Restric
glossa
other k
previo
reinfor
and fa
-
12
Allow s
their a
integra
far into
enable
teache
EMT443
Lesson Number
Lesson 10- Types of
Networks
Melinda Hicks
Content
Students learn about:
- Types of Networks such as
- Local Area Network
(LAN)
- Wide Area Network
(WAN)
- Virtual Private
Network (VPN)
11416723
Skills
Students learn to:
- Graphically represent a
LAN or WAN using ICT such
as graphics software
Teac
Scaffolded
Discus
the bo
networ
of diag
to take
-
Give st
Netwo
throug
for the
them a
they h
lesson
Using
availab
studen
graphi
LAN an
studen
knowle
and en
visuall
networ
Remin
of the
thinkin
assign
should
inform
it.
13
EMT443
Lesson Number
Lesson 11- Types of
Networks
Melinda Hicks
Content
Students learn about:
- Types of Networks such as
- Local Area Network
(LAN)
- Wide Area Network
(WAN)
- Virtual Private
Network (VPN)
11416723
Skills
Students learn to:
- Design a small network of
at least two work stations
to allow for file sharing.
- Explain the school
communications link to the
outside world.
Teac
Scaffolded
- Using
school
from le
studen
explain
comm
outside
topic t
world.
-
Lesson Number
Lesson 13- Data
Transmission Media
Content
Students learn about:
- Data Transmission Media
- Wire
- Wireless
Discus
modes
Allowin
the top
a class
Watch
Duplex
studen
betwee
modes
Create
for the
under
to use
transm
and vis
for stu
Teac
Skills
Students learn to:
- Examine the range of
media for data
transmission
As a cl
studen
up a sm
sharing
explore
system
that is
Give st
Transm
Worksh
discus
gaps s
Introdu
new w
Scaffolded
- Lead a
what is
transm
14
EMT443
Melinda Hicks
11416723
studen
own pr
Lesson Number
Lesson 14- Data
Transmission Rates
Content
Students learn about:
- Data Transmission rates:
- Baud rates
- Bits per second
Enable
on the
transm
them e
explore
Watch
video,
take n
The vid
differe
transm
Discus
as a cl
learnin
studen
of wha
Watch
Netwo
Home
which
cables
Discus
as a cl
learnin
studen
of wha
Allow c
list of t
used, a
addres
add to
addres
Teac
Draw a
board
knowle
rates,
allowin
their o
Skills
Students learn to:
- Discuss and compare the
methods used to measure
transmission rates
Cooperati
- Split cl
have o
baud r
group
second
15
EMT443
Melinda Hicks
11416723
to hav
debate
followi
studen
motiva
contro
Cooperati
Scaffolded
- Have t
studen
class,
the roo
studen
their o
debate
compa
data tr
-
16
Bring t
togeth
conclu
discus
transm
mind m
transm
reinfor
EMT443
Lesson Number
Lesson 16- Factors
influencing media
Transmission
Lesson 17Assignment
Developments
Melinda Hicks
11416723
Content
Students learn about:
- Factors influencing media
transmission such as:
- Cost
- Distance
- Extension limitations
such as the number
of nodes and
sustainability
Skills
Students learn to:
- Assess the impact of
factors influencing the
choice of transmission
media
Lesson Number
Lesson 18- Protocols
Content
Students learn about:
- Protocols such as:
- TCP/IP
- IPX/SPX
Teac
-
Discus
are fac
could i
transm
As a cl
Facto
Transm
form o
studen
Hando
Transm
Worksh
reinfor
giving
of thei
Go ove
to the
reinfor
ensure
correc
Encour
continu
assign
about
transm
use.
Remin
their a
followi
for foll
Studen
learnin
assign
studen
about
teache
unders
the stu
their in
develo
networ
Teac
Skills
Students learn to:
- Define and describe the
purpose of a protocol
Scaffolded
- Discus
protoc
studen
17
EMT443
Melinda Hicks
-
Netbui
appletalk
11416723
-
other.
-
Watch
allowin
notes,
mainly
protoc
Have a
video,
Allow s
online
write n
protoc
their a
Studen
groups
that us
protoc
learnin
knowle
Studen
perform
play.
Hando
Worksh
has be
throug
lesson
Go ove
studen
making
the rig
18
EMT443
Lesson Number
Lesson 21- Security
of Information
Melinda Hicks
11416723
Content
Students learn about:
- Security of Information
- Storage
- Backup
- security
Skills
Students learn to:
- Describe the
appropriateness of
different storage media
including backup
requirements
-
Investigate a range of
security techniques that
apply to networks
Investigate a range of
security techniques that
apply to networks
Teac
-
Watch
allowin
notes i
expalin
involve
Discus
Secu
sheet
Watch
Study
to answ
sheet i
enable
thems
world s
Hando
worksh
revises
how it
transm
Ask stu
online
intune
investi
compa
transa
comm
for eac
contra
investi
real wo
visit in
Remin
remem
assign
class.
followi
19
EMT443
Melinda Hicks
Lesson Number
Lesson 23Assignment
Developments
11416723
Content
Students learn about:
- Project Development
processes and techniques
Skills
Students learn to:
- Design, produce and
evaluate a simple project
for a real world application
-
Lesson Number
Lesson 25- Network
Operating Systems
Network topologies
including
- Star
- Ring
- Bus
Teac
-
Compare a client/server
network with a peer-peer
network
Play D
Game
in the
to rein
the ter
Watch
Netwo
reinfor
networ
Hando
Netwo
worksh
networ
knowle
Skills
Students learn to:
- Recognise the purpose of a
network operating system
software
-
Studen
learnin
assign
studen
about
teache
unders
the stu
their le
develo
networ
Watch
Revisio
basic n
Teac
Scaffolded
- Lead a
what a
system
know o
20
EMT443
Melinda Hicks
11416723
groups, security
permissions and
policies and profiles,
use of compression
technology
management strategies
Read
System
discus
to lear
a class
Lesson Number
Lesson 28Networking Systems
Discus
import
passw
Relate
world i
Cooperati
- Split st
groups
and do
presen
the res
(to con
followi
Scaffolded
- Discus
networ
strateg
back to
study (
reinfor
knowle
integra
Cooperati
- Studen
NOS re
point p
groups
followi
Skills
Teac
21
Studen
groups
point p
class.
Remin
assign
EMT443
Lesson 29Assignment
Developments
Melinda Hicks
11416723
Scaffolded
- Discus
knowle
3, abo
networ
previo
-
Lesson Number
Lesson 31- Peer to
peer network
Content
Students learn about:
- Peer to Peer Network
-
Lesson 32-
Setting up a LAN
Skills
Students learn to:
- Assemble a simple peerpeer communication
system
followi
(prepa
followi
Studen
learnin
assign
studen
about
networ
Hando
peer n
studen
integra
skills t
peer n
creatin
(contin
lesson
Teac
Scaffolded
- Studen
networ
-
Discus
they w
securit
and wh
would
reinfor
knowle
peer to
Using
peer n
basis e
and co
school
Remin
their a
followi
for the
Studen
22
EMT443
Assignment
Development
Melinda Hicks
-
Project Development
processes and techniques
11416723
-
learnin
assign
studen
about
networ
Studen
finishin
as it is
lesson
their a
23
EMT443
Melinda Hicks
Lesson Number
Lesson 33- Internet
Case Study
11416723
Content
Skills
Security of information
- Storage
- Backup
- Security
Lesson Number
Lesson 35Assignment
Development
Components of networks
Security of Information
- Storage
- Backup
- Security
Hando
Study
comple
integra
knowle
real wo
Watch
After In
videos
world s
would
crashe
Watch
Corpor
relatin
to the
Allow s
worksh
discus
If a do
availab
lesson
local to
resear
system
interne
librarie
discus
differe
networ
compo
Content
Students learn about:
- Project Development
processes and techniques
Describe the
appropriateness of
different storage media
including backup
requirements
Teac
Remin
assign
class t
lesson
Teac
-
24
Studen
learnin
assign
studen
about
networ
Studen
finishin
EMT443
Melinda Hicks
11416723
to be h
followi
Studen
assign
Enable
as a cl
networ
with or
attemp
and an
Play D
game,
System
recogn
reinfor
terms.
Cooperati
- Split st
four an
using
Questi
knowle
studen
cooper
25
EMT443
Melinda Hicks
11416723
References
(n.d.). Retrieved October 6, 2010, from Tech Tutorials: http://www.youtube.com/watch?
v=Wc1dOw4j3J8
All Online Data Lost After Internet Crash! (2007, July 11). Retrieved October 10, 2010, from
YouTube: http://www.youtube.com/watch?v=z4vDClhnJjs
ApFaqTech. (2010, February 28). How to pick the right Network Cables for your Home
Network. Retrieved October 2, 2010, from YouTube: http://www.youtube.com/watch?
v=C2Ovabby7zw
Computers, E. (2008, April 28). Explaining Computer Security. Retrieved October 6, 2010,
from YouTube: http://www.youtube.com/watch?v=Wc1dOw4j3J8
darkwinglh. (2007, January 1). Computer Security 101. Retrieved October 6, 2010, from
YouTube: http://www.youtube.com/watch?v=_E4DO4ADCqw&feature=related
Grover, D. (1999). More Creative Ideas for Teaching Computer Studies. Sydney: David Grover.
Grover, D., Range, J., Knights, H., Gormley, E., & Perri, S. (2005). Information and Software
Technology A Project-Based Approach. Melbourne: Pearson Education Australia.
Internet Basics : How Does a Wireless Network Internet Connection Work? (2010, March 23).
Retrieved October 10, 2010, from YouTube: http://www.youtube.com/watch?v=gi1QkmGVf5E
lacvietthusinh. (2006, November 24). Network Topology. Retrieved September 30, 2010, from
YouTube: http://www.youtube.com/watch?v=oVOeNcJJYos&feature=related
lacvietthusinh. (2006, November 24). Ring Topology. Retrieved September 30, 2010, from
YouTube: http://www.youtube.com/watch?v=U6TX4Zbu2ao&feature=related
lacvietthusinh. (2006, November 24). Star Topology. Retrieved September 30, 2010, from
YouTube: http://www.youtube.com/watch?v=aNxxrawNu48&feature=related
Pereira, L. (1997). Computers Don't Byte. Australia: Hawker Brownlow Education.
Powers, G. (1996). Computing Studies An Introductory Course. Port Melbourne: Heinemann.
Powers, G. (2010). Information and Software Technology stage 5. Port Melbourne: Heinemann.
Studies, B. o. (3003). Information and Software Technology Elective Course Year 7-10
Syllabus. Sydney: Board of Studies NSW.
Tanvir, K. (2009, November 13). Half Duplex Full Duplex . Retrieved October 2, 2010, from
YouTube: http://www.youtube.com/watch?v=sYOXtIl_lO0
Ware, P., Cooke, P., Opfer, D., & Wall, J. (2005). IST: Information and Software Technology 7-10.
Milton: John Wiley & Sons Australia.
Wilson, C. (2001). Exploring Computing Studies (2nd ed.). New York: Cambridge University
Press.
Wired vs Wireless. (2008, February 6). Retrieved October 2, 2010, from YouTUbe:
http://www.youtube.com/watch?v=ykuRokSgRIU&feature=related
26
EMT443
Melinda Hicks
11416723
youfiberlink. (2008, April 9). The Internet as a Corporate Network. Retrieved October 10,
2010, from YouTube: http://www.youtube.com/watch?v=nH4GoXEoiSc
Appendices
Appendix 1: Past, Current and Emerging Technologies Worksheet
Name__________________________________Date_________Class________
Networking has been the _______________ of many changes in computer technology. Connectivity
eventually led to the _______________ of the Internet when the US Department of _______________
wanted to share files between computers in the 1960s. Newer and _______________ means of
connecting computers, both in terms of _______________ and software, are continually occurring.
In more recent times, _______________ computers now have an alternative to _______________ as a
means of connecting to the wider world. ADSL, _______________ and satellite connections (the three
types of _______________) have improved the data _______________ speeds possible at home.
Many peripheral _______________ no longer need to be physically cabled to the system
_______________, instead transferring data by infra-red _______________. Laptop computers can use
_______________ transmitters to connect to _______________ provided that they are within a certain
physical _______________.
Operating systems are starting to _______________ networking components as part of the
_______________ installations. It has become _______________ for the average person to build a
home _______________.
It is hard to _______________ the shape of future networking systems. Designers and
_______________ are working towards faster _______________ transfer methods. Unfortunately,
_______________ are also pushing them to develop more _______________ systems.
27
EMT443
Melinda Hicks
11416723
28
EMT443
Melinda Hicks
11416723
Name__________________________________Date_________Class________
Issues
Rhyming words have been swapped for the bold words shown. Work out the word that should be used.
Software licences can be accidentally breached when networks are used. Program licences should be
carefully bed before programs are installed on network computers to ensure that licensing conditions
are being pet. Large whines can be issued to people who make the copyright involved in software
licences.
Hacking refers to unauthorised access to piles. Networks should be carefully banned to reduce the
chance of hacking. User games and passwords can be used to restrict access to either the whole network
or hearts of the network. Firewalls can rock access to machines that are outside the immediate network.
Networks have caused many ranges in the workplace. Virtual offices allow people to connect to
networks from remote locations much as when they are travelling or working from roam
(telecommuting). The easy transfer of files from employee to employee has reduced the speed for
printoutssome offices are slowly becoming paperless. However, the downside has been that many
people have been forced to burn computer skills in order to sleep their jobs.
29
EMT443
Melinda Hicks
11416723
30
EMT443
Melinda Hicks
11416723
31
EMT443
Melinda Hicks
11416723
32
EMT443
Melinda Hicks
11416723
33
EMT443
Melinda Hicks
11416723
34
EMT443
Melinda Hicks
11416723
Exercise 13.3
1 What am I?
a A private network carrying encrypted data across the Internet.
b A controlling computer in a network that stores the programs
and data shared by users.
c A link between two different types of networks.
d A network with no central server but each computer is both a
server and a client.
3 True or false?
a A WAN is often made up of a collection of LANs.
b Each node is connected directly to a hub.
c A bridge is used to rebuild a fading signal to its original
strength and shape before transmitting it onwards.
d Most networks use a peer-to-peer network for their LAN.
35
EMT443
Melinda Hicks
11416723
Humans and other _______________ have been _______________ for millions of years. Most of our
conversational communications have used either: sound and other forms of _______________ of the
air, solids and the _______________ that surrounds us; or visual cues, requiring the movement of
reflected light from one life-form to the visual _______________ of another life-form. Humans
developed sophisticated languages to _______________ data, and invented new media to
_______________ this data. The invention of _______________ and printing enabled the very largescale
transfer of data in the form of _______________ and _______________. During the 19th
century, the invention and use of the _______________ led to widespread use of the
_______________ transmission of messages by signals. In the 21st _______________, most of our
data transmission is via the wires that make up telephone and _______________ networks.
Network computers are _______________ to each other using:
a wire-based medium, such as _______________ wire
wireless adaptors and wireless access _______________over a wireless medium
a _______________ of _______________ infrastructure and _______________ media
36
EMT443
Melinda Hicks
11416723
37
EMT443
Melinda Hicks
11416723
38
EMT443
Melinda Hicks
Appendix 7: Media Transmission Revision Worksheet
11416723
Data Transmission
Remember
1. Define the term data transmission.
2. Describe three types of data transmission.
3. Give three advantages of optical fibres over copper wire cable for data transmission and
give one disadvantage.
4. Describe one disadvantage of using radio waves to transmit data.
5. Describe three influences on data transmission.
Think
1. Explain the differences between optical fibre and UTP cables
2. Explain the difference between baud rate and bps.
39
EMT443
Melinda Hicks
Appendix 8: Protocol Revision Worksheet
11416723
Protocols
Remember
1. Define the term protocol.
2. Explain what each of the following protcol names stand for, and describe the main features
of each protocol.
-
TCP/IP
IPX/SPX
Netbui
Appletalk
Think
1. Discus why there are so many protocols.
40
EMT443
Melinda Hicks
Appendix 9: Security Case Study (Worksheet)
11416723
41
EMT443
Melinda Hicks
11416723
Name__________________________________Date_________Class________
Data handling
Common two- and three-letter words have been substituted with symbols. Decode the information.
Networking systems designed transfer data. Files may stored a central server,
access them may rely network place. Most networks transfer data with serial transmission.
Data sent one bit after another along connecting channels, usually packets data. Packets
contain data front indicating destination packet.
Broadband systems transfer data a similar fashion parallel data transfer. Multiple packets data
can sent once through connecting cabling. Optic fibres utilise broadband transmission.
speed a network measured how many bits can transferred per second. main parts
larger networks usually have transmission rates measured gigabits per second.
Data security becomes an issue with computer networks because large volumes data being
transferred through network. Encryption technology scrambles data before it sent, it
decrypted when it arrives its destination. receiving computer must possess correct key
able decode data correctly. Insecure network sections often involve wireless data transmission
infra-red signals radio transmitters (short distance), microwave signals (mid-distance), satellites
(long distance).
42
EMT443
Melinda Hicks
11416723
43
EMT443
Melinda Hicks
11416723
Purpose
The network operating system manages the flow of data across the network. It
enables clients (workstations) attached to the network to access network resources,
such as files and printers, that are shared by the network servers. Usually, many
clients are attached to a LAN so clients may request access to one or more network
services simultaneously. The NOS must be able to handle several requests at once;
this is called `multitasking'. In addition, the client operating system must be able to
multitask because it needs to handle incoming network traffic, such as email, without
demanding the user's attention. This allows the user to perform other tasks on the
workstation without interruption. The NOS typically comprises two parts: the client
software that is installed on each workstation and the server software that is installed
on the server only. Together, the client software and the server software provide a
secure method for clients to access resources on the server. When users log in, their
identity is authenticated by the server. This means that the client software sends the
user name and password to the server. The server software then searches its
database for that username. If the user exists and the password is correct, the user
will be logged in to the system. If the user does not exist or the password is incorrect,
the user will not be logged in to the system and an error message will be displayed.
For a network to function efficiently, the network server running the NOS must meet
the minimum required specifications. The table on the right shows the minimum
hardware requirements of some popular network operating systems.
Management
A network operating system provides the network administrator with the tools to
manage the network. The network administrator uses these tools to perform a huge
range of tasks including:
establishing users and groups. The network administrator adds and removes users
and groups from the system. Users and groups are allocated access to the
resources they need to do their work. Groups contain users who have similar tasks
to perform and who require access to the same resources. Establishing groups
allows the network administrator to give file and resource permissions to a group
instead of individual users. When users are added to a group, they acquire the
permissions of that group.
security permissions. Security is an integral part of any network. When users are
created, they are given access only to the files and resources that they will need to
perform their work. These security permissions are usually applied when the user
logs in to the network.
policies and profiles. Policies and profiles are used to customise the client's
desktop. Policies can be `open' (users have rights to use everything on the client
machine) or `locked down' to restrict what a user can do on a client machine.
Profiles can be used in conjunction with policies. Profiles generally give the user a
44
EMT443
Melinda Hicks
11416723
45
EMT443
Melinda Hicks
11416723
46
EMT443
Melinda Hicks
11416723
47
EMT443
Melinda Hicks
11416723
48
EMT443
Melinda Hicks
11416723
49
EMT443
Melinda Hicks
11416723
50
EMT443
Melinda Hicks
11416723
51
EMT443
Melinda Hicks
11416723
Think
How is network security and management important in a growing global network and
in what way can individuals safely and securely use the internet?
52
EMT443
Melinda Hicks
11416723
EMT443
Melinda Hicks
11416723
C. bridge
D. network interface card
True of False
1. Duplex data could be sent along a single wire which allowed data transmission in only one direction?
2. A Bus is a network topology where all the nodes are attached in the shape of a closed loop?
3. An operating system to support computers connected on a LAN is a NOS?
4. The baud rate is the number of bits transferred per second?
5. A computer that provides resources to other computers on the network is called a server?
54
EMT443
Melinda Hicks
11416723
C
B
C
C
D
B
B
A
True/False
1.
2.
3.
4.
5.
T
F
T
F
T
Word Answers
1.
2.
3.
4.
5.
6.
7.
8.
9.
55