Skip to main content

Networking systems and social computing

This lesson comprises eight (8) master classes focusing on:

  • Disruptive technologies
  • Graph and network theory
  • Internet of Things (IoT) and the Internet of Me (IoMe)
  • Cloud computing
  • Networks and connectivity
  • Network protocols
  • Device interoperability
  • Data security
  • Network models and architectures

Content:


Introduction to human-centric computing

  • Investigate the effects of disruptive technology on everyday computing, including:
    • effects on the individual
    • innovations in infrastructure, hardware and software
    • trends and technology buzzwords
  • Investigate the application of graph and network theory in the design of social networks
  • Describe how web applications and dedicated apps for mobile devices influence the success of social networking
  • Investigate how the development of hardware and software has influenced the adoption of the Internet of Things (IoT) and the Internet of Me (IoMe), including:
    • impact on the individual
    • impact on enterprise, including edge computing
    • hardware infrastructure
    • software protocols
    • data backup
    • regulation, compliance and cybersecurity
  • Outline the business and individual cultural characteristics that contribute to the success of start-ups

 

Storage and workflow in enterprise networks

  • Investigate how the developments in network connectivity and speed have influenced work practices within an enterprise, including:
    • remote working opportunities
    • file sharing
    • task delegation and monitoring
  • Examine the benefits and limitations of digital workflows operating in an enterprise
  • Investigate data storage requirements for an enterprise, including:
    • capacity
    • accessibility
    • location
    • security
  • Explore cloud computing services, including:
    • Infrastructure as a Service (IaaS)
    • Software as a Service (SaaS)
    • Platform as a Service (PaaS)
  • Compare different types of cloud-based data storage in terms of access and services, including:
    • public cloud
    • private cloud
    • hybrid cloud
    • non-cloud on premises

 

Network architecture and infrastructure

  • Describe key components of an organisation’s information technology infrastructure, including:
    • networking, including servers, storage and end-point devices
    • on-premises computing
    • cloud computing
  • Describe how transmission media is used in networks
  • Explain factors that interfere with the transmission of data across a computer and social network, including:
    • distance
    • topography
    • physical barriers
    • environmental barriers
  • Investigate ways to improve data flow within a system, considering proximity and modes of connectivity, including:
    • size, location and power of antennae when using satellite and microwave
    • traffic filtering
    • flow scheduling and traffic monitoring on telecommunications, including wireless broadband for mobile devices (3G→), Bluetooth and wi-fi
  • Investigate the application of graph theory and network theory in the design of optimised computer networks, including:
    • adjacency
    • centrality
    • connectedness
    • weighted graphs
  • Explore device interoperability within an Internet of Things (IoT) based enterprise network, including supervisory control and data acquisition (SCADA)
  • Investigate communication protocols between devices in an Internet of Things (IoT) network
  • Explore the benefits of interfacing machine learning (ML) with IoT, including:
    • data-driven optimisation to enable predictive maintenance and logistics in manufacturing
    • data acquired from medical imaging to improve accuracy of diagnosis
    • improving traffic control through ML and sensors
    • automating soil moisture data collection to manage farm irrigation
  • Investigate security measures used to control access to networks, including:
    • password systems
    • biometric measures
    • CAPTCHA
    • trusted Platform Module (TPM)
    • automatic software updates
  • Examine data security for an intelligent home network, including:
    • access levels, including universal plug and play (UPnP)
    • passwords and firewalls
    • port management on routers and switches
    • wi-fi device positioning
    • virtual private networks (VPNs) and hidden networks
    • backup and disaster recovery

 

Creating a network

  • Design and model a network of interconnected devices for a specific purpose
  • Apply appropriate project management tools to develop a project
  • Configure devices within a network, including:
    • naming the device
    • updating the device
    • configuring security protocols
    • connecting to the internet
  • Implement procedures and security protocols considering cybersecurity
  • Explore opportunities for optimising network performance, including:
    • improving bandwidth
    • updating drivers and firmware
  • Evaluate the role of hardware and software related to the transmission of data, including:
    • unsecured data
    • encrypted data
    • infrastructure