MindMap Gallery Computer Network
A computer network is a group of computers that use a set of common communication protocols over digital interconnections for the purpose of sharing resources located on or provided by the network nodes.
Edited at 2020-10-10 03:13:19Mind maps are a great resource to help you study. A mind map can take complex topics like plant kingdom and illustrate them into simple points, as shown above.
Mind maps are useful in constructing strategies. They provide the flexibility of being creative, along with the structure of a plan.
Vitamins and minerals are essential elements of a well-balanced meal plan. They help in ensuring that the body is properly nourished. A mind map can be used to map out the different vitamins a person requires.
Mind maps are a great resource to help you study. A mind map can take complex topics like plant kingdom and illustrate them into simple points, as shown above.
Mind maps are useful in constructing strategies. They provide the flexibility of being creative, along with the structure of a plan.
Vitamins and minerals are essential elements of a well-balanced meal plan. They help in ensuring that the body is properly nourished. A mind map can be used to map out the different vitamins a person requires.
Computer-Network-Mind-Map
Types of Network
- local area network (LAN)
- wide area network (WAN)
- internet
- WAN technologies
- frame relay
- MPLS
- ATM
- Personal Area Network (PAN)
- logical and physical topologies
- Star
- Bus
- Ring
- Mesh
- Tree
- network access methods
- CSMA
- Token Passing
- network models
- OSI 7 Layer
- TCP/IP
Network Protocols and Standards Technologies
- TCP/IP
- AppleTalk
- UDP
- 802.2
- 802.3
- FDDI
- 802.5
- wireless technologies
- 802.11
- Infrared
- BlueTooth
- 3G
- factors affecting range andspeed of wireless
Application Layer Protocols
- DNS
- DHCP
- HTTP
- FTP
- SMTP
Key components
- network devices
- workstations
- Servers
- File
- Web
- Proxy
- NIC (Network Interface Card)
- Interconnection Devices
- Wireless Access Points
- Switch
- Wireless Access Point
- Router
- connectors and cabling
- Leased line
- Dedicated line
- Media Types
- STP
- UTP
- Category 5
- Coaxil
- Fibre Optic
- Wireless
- Mobile technology
- Cable/Connection Standards
- Software
- network operating system
- Virus Checker
- Firewall
- Email Clients
- Commercial systems
- MAC OSX
- Linux
- Windows
Securing a System
- Passwords
- Authorisation Permissions
- Access Control Lists
- Backing Up & Restoring
- Encrypting
- Others
- Biometrics
- Physical Security
- CCTV
- Locks
- Firewalls
- Security Risk Levels
- Software Protection
- Anti-Virus
- Intrusion Detection Systems
Business risks
- Loss of service
- loss of business or income egthrough loss of customerrecords;
- Loss of Service
- Loss of Confidentiality
- Compromised data integrity
- Security Issues
- Malware
- Viruses
- Trojans
- Worms
- Spyware
- Adware
Directory services
- account management
- authentication management
- active directory
- DNS
Telecommunication services
- communication
- internet relay chat (IRC)
- discussion boards
- remote access
- via mobiles
- remote desktop
- social networking
File services
- File transfer
- file sharing
Application Services
- Application software
- Database
- Web
- Proxy
- Shared Resources
- Printing
- Storage Space
- Voice Over IP (VoIP)
- Authentication
- Users
- Hardware
- Mobile Working