Get Started. It's Free
or sign up with your email address
Computer Networks by Mind Map: Computer Networks

1. Adware

2. Leased line

3. Types of Network

3.1. local area network (LAN)

3.2. wide area network (WAN)

3.3. internet

3.4. WAN technologies

3.4.1. frame relay

3.4.2. MPLS

3.4.3. ATM

3.5. Personal Area Network (PAN)

3.6. logical and physical topologies

3.6.1. Star

3.6.2. Bus

3.6.3. Ring

3.6.4. Mesh

3.6.5. Tree

3.7. network access methods

3.7.1. CSMA

3.7.2. Token Passing

3.8. network models

3.8.1. OSI 7 Layer

3.8.2. TCP/IP

4. Network Protocols and Standards Technologies

4.1. TCP/IP

4.2. AppleTalk

4.3. UDP

4.4. 802.2

4.5. 802.3

4.6. FDDI

4.7. 802.5

4.8. wireless technologies

4.8.1. 802.11

4.8.2. Infrared

4.8.3. BlueTooth

4.8.4. 3G

4.8.5. factors affecting range and speed of wireless

5. Application Layer Protocols

5.1. DNS

5.2. DHCP

5.3. HTTP

5.4. FTP

5.5. SMTP

6. Key components

6.1. network devices

6.1.1. workstations

6.1.2. Servers

6.1.2.1. Print

6.1.2.2. Mail

6.1.2.3. File

6.1.2.4. Web

6.1.2.5. Proxy

6.1.3. NIC (Network Interface Card)

6.2. Interconnection Devices

6.2.1. Wireless Access Points

6.2.2. Switch

6.2.3. Wireless Access Point

6.2.4. Router

6.3. connectors and cabling

6.3.1. Dedicated line

6.3.2. Media Types

6.3.2.1. STP

6.3.2.2. UTP

6.3.2.2.1. Category 5

6.3.2.3. Coaxil

6.3.2.4. Fibre Optic

6.3.3. Wireless

6.3.4. Mobile technology

6.3.5. Cable/Connection Standards

6.4. Software

6.4.1. network operating system

6.4.2. Virus Checker

6.4.3. Firewall

6.4.4. Email Clients

6.5. Commercial systems

6.5.1. MAC OSX

6.5.2. Linux

6.5.3. Windows

7. Directory services

7.1. account management

7.2. authentication management

7.3. active directory

7.4. DNS

8. Telecommunication services

8.1. communication

8.1.1. email

8.1.2. internet relay chat (IRC)

8.1.3. discussion boards

8.2. remote access

8.2.1. via mobiles

8.2.2. remote desktop

8.2.3. social networking

9. File services

9.1. File transfer

9.2. file sharing

10. Application Services

10.1. Application software

10.1.1. Database

10.1.2. Web

10.2. Proxy

10.3. Shared Resources

10.3.1. Printing

10.3.2. Storage Space

10.4. Voice Over IP (VoIP)

10.5. Authentication

10.5.1. Users

10.5.2. Hardware

10.6. Mobile Working

11. Securing a System

11.1. Authorisation Permissions

11.1.1. Access Control Lists

11.2. Backing Up & Restoring

11.3. Encrypting

11.4. Others

11.4.1. Biometrics

11.4.2. Physical Security

11.4.2.1. CCTV

11.4.2.2. Locks

11.5. Firewalls

11.6. Security Risk Levels

11.7. Software Protection

11.7.1. Anti-Virus

11.7.2. Intrusion Detection Systems

12. Business risks

12.1. Loss of service

12.2. loss of business or income eg through loss of customer records;

12.3. Loss of Service

12.4. Loss of Confidentiality

12.5. Compromised data integrity

12.6. Security Issues

12.6.1. Malware

12.6.2. Viruses

12.6.3. Trojans

12.6.4. Worms

12.6.5. Spyware