Create your own awesome maps

Even on the go

with our free apps for iPhone, iPad and Android

Get Started

Already have an account?
Log In

Computer Networks by Mind Map: Computer Networks
0.0 stars - reviews range from 0 to 5

Computer Networks

Types of Network

local area network (LAN)

wide area network (WAN)

internet

WAN technologies

frame relay

MPLS

ATM

Personal Area Network (PAN)

logical and physical topologies

Star

Bus

Ring

Mesh

Tree

network access methods

CSMA

Token Passing

network models

OSI 7 Layer

TCP/IP

Network Protocols and Standards Technologies

TCP/IP

AppleTalk

UDP

802.2

802.3

FDDI

802.5

wireless technologies

802.11

Infrared

BlueTooth

3G

factors affecting range and speed of wireless

Application Layer Protocols

DNS

DHCP

HTTP

FTP

SMTP

Key components

network devices

workstations

Servers, Print, Mail, File, Web, Proxy

NIC (Network Interface Card)

Interconnection Devices

Wireless Access Points

Switch

Wireless Access Point

Router

connectors and cabling

Leased line

Dedicated line

Media Types, STP, UTP, Category 5, Coaxil, Fibre Optic

Wireless

Mobile technology

Cable/Connection Standards

Software

network operating system

Virus Checker

Firewall

Email Clients

Commercial systems

MAC OSX

Linux

Windows

Directory services

account management

authentication management

active directory

DNS

Telecommunication services

communication

email

internet relay chat (IRC)

discussion boards

remote access

via mobiles

remote desktop

social networking

File services

File transfer

file sharing

Application Services

Application software

Database

Web

Proxy

Shared Resources

Printing

Storage Space

Voice Over IP (VoIP)

Authentication

Users

Hardware

Mobile Working

Securing a System

Passwords

Authorisation Permissions

Access Control Lists

Backing Up & Restoring

Encrypting

Others

Biometrics

Physical Security, CCTV, Locks

Firewalls

Security Risk Levels

Software Protection

Anti-Virus

Intrusion Detection Systems

Business risks

Loss of service

loss of business or income eg through loss of customer records;

Loss of Service

Loss of Confidentiality

Compromised data integrity

Security Issues

Malware

Viruses

Trojans

Worms

Spyware

Adware