Computer Networks

Get Started. It's Free
or sign up with your email address
Rocket clouds
Computer Networks by Mind Map: Computer Networks

1. Types of Network

1.1. local area network (LAN)

1.2. wide area network (WAN)

1.3. internet

1.4. WAN technologies

1.4.1. frame relay

1.4.2. MPLS

1.4.3. ATM

1.5. Personal Area Network (PAN)

1.6. logical and physical topologies

1.6.1. Star

1.6.2. Bus

1.6.3. Ring

1.6.4. Mesh

1.6.5. Tree

1.7. network access methods

1.7.1. CSMA

1.7.2. Token Passing

1.8. network models

1.8.1. OSI 7 Layer

1.8.2. TCP/IP

2. Network Protocols and Standards Technologies

2.1. TCP/IP

2.2. AppleTalk

2.3. UDP

2.4. 802.2

2.5. 802.3

2.6. FDDI

2.7. 802.5

2.8. wireless technologies

2.8.1. 802.11

2.8.2. Infrared

2.8.3. BlueTooth

2.8.4. 3G

2.8.5. factors affecting range and speed of wireless

3. Application Layer Protocols

3.1. DNS

3.2. DHCP

3.3. HTTP

3.4. FTP

3.5. SMTP

4. Key components

4.1. network devices

4.1.1. workstations

4.1.2. Servers

4.1.2.1. Print

4.1.2.2. Mail

4.1.2.3. File

4.1.2.4. Web

4.1.2.5. Proxy

4.1.3. NIC (Network Interface Card)

4.2. Interconnection Devices

4.2.1. Wireless Access Points

4.2.2. Switch

4.2.3. Wireless Access Point

4.2.4. Router

4.3. connectors and cabling

4.3.1. Leased line

4.3.2. Dedicated line

4.3.3. Media Types

4.3.3.1. STP

4.3.3.2. UTP

4.3.3.2.1. Category 5

4.3.3.3. Coaxil

4.3.3.4. Fibre Optic

4.3.4. Wireless

4.3.5. Mobile technology

4.3.6. Cable/Connection Standards

4.4. Software

4.4.1. network operating system

4.4.2. Virus Checker

4.4.3. Firewall

4.4.4. Email Clients

4.5. Commercial systems

4.5.1. MAC OSX

4.5.2. Linux

4.5.3. Windows

5. Directory services

5.1. account management

5.2. authentication management

5.3. active directory

5.4. DNS

6. Telecommunication services

6.1. communication

6.1.1. email

6.1.2. internet relay chat (IRC)

6.1.3. discussion boards

6.2. remote access

6.2.1. via mobiles

6.2.2. remote desktop

6.2.3. social networking

7. File services

7.1. File transfer

7.2. file sharing

8. Application Services

8.1. Application software

8.1.1. Database

8.1.2. Web

8.2. Proxy

8.3. Shared Resources

8.3.1. Printing

8.3.2. Storage Space

8.4. Voice Over IP (VoIP)

8.5. Authentication

8.5.1. Users

8.5.2. Hardware

8.6. Mobile Working

9. Securing a System

9.1. Passwords

9.2. Authorisation Permissions

9.2.1. Access Control Lists

9.3. Backing Up & Restoring

9.4. Encrypting

9.5. Others

9.5.1. Biometrics

9.5.2. Physical Security

9.5.2.1. CCTV

9.5.2.2. Locks

9.6. Firewalls

9.7. Security Risk Levels

9.8. Software Protection

9.8.1. Anti-Virus

9.8.2. Intrusion Detection Systems

10. Business risks

10.1. Loss of service

10.2. loss of business or income eg through loss of customer records;

10.3. Loss of Service

10.4. Loss of Confidentiality

10.5. Compromised data integrity

10.6. Security Issues

10.6.1. Malware

10.6.2. Viruses

10.6.3. Trojans

10.6.4. Worms

10.6.5. Spyware

10.6.6. Adware