3.3+Networks


 * //Network technologies//**
 * **//Client, host, server//**
 * **//Mainframe, supercomputers//**
 * **//Grid computing, distributed processing//**
 * **//Ethernet, peer-to-peer (P2P)//**
 * **//Local area network (LAN), wide area network (WAN), virtual LAN (VLAN), wireless LAN (WLAN), home//** **//network//**
 * **//Internet, intranet, extranet, virtual private network (VPN)//**
 * **//Routers, switches, hubs//**
 * **//Connection types: optical fibre, cable, wireless technologies such as wireless fidelity (WiFi), worldwide//** **//interoperability for microwave access (WiMax), Bluetooth, microwave//**
 * **//Network operating systems and utility software//**
 * **//Cloud computing//**
 * **//Storage technologies: for example, SAN (storage area network), RAID (redundant array of inexpensive//** **//disks)//**
 * //Network functionality//**
 * **//Protocols//**
 * **//Synchronous, asynchronous//**
 * **//Remote access//**
 * **//Bandwidth, broadband//**
 * **//Bit rates//**
 * //Network administration//**
 * **//Electronic security: for example, authorized access, levels of access, biometrics, login, password,//** **//firewalls, proxy server, encryption, secure socket layer (SSL), audit trails//**
 * **//Licences: single-user, multi-user, concurrent, network, site//**
 * **//Physical security: for example, locks//**
 * **//Monitoring: for example, keystroke monitoring, system performance, surveillance//**
 * **//Network policies: for example, backup, archiving, disaster recovery, usage, redundancy, failover//**
 * **//Codes of ethics and professional conduct: for example, ACM (Association for Computing Machinery)//**
 * **//Data centres//**
 * **//Energy usage, uninterruptable power supply (UPS)//**