SlideShare uma empresa Scribd logo
1 de 15
NETWORK
BY – AKASH SINGH
WHAT IS A NETWORK ?
• Network, in computer science, a group of computers and associated
devices that are connected by communications facilities.
• Network is an inter connected collection of autonomous computers.
• When two or more computers are joined together so that they are
capable of exchanging information , they form a network.
NEED OF NETWORKING ?
• Resource sharing - Through a network , data , s/w and h/w
resources can be shared irrespective of the physical location of the
resources and the user.
• Reliability – A file can have its copies on two or more computers of
the network.
• Reduced Cost – Sharing resources reduces the cost
• Fast Communication – Information can be exchanged at a very fast
speed.
WHAT IS INTERNET ?
Internet is worldwide network of computer networks.
How does it work ?
• Most computers are not connected directly to the internet .
• They are connected to smaller networks .
• Which are connected through gateways to the internet
backbone .
WHAT IS A GATEWAY ?
• Gateway is a device that connects
dissimilar networks.
• A backbone is a central interconnecting
structure that connects one or more
networks just like the trunk of a tree.
FEW THINGS RELATED TO NETWORK
• Workstation or Nodes : refers
to a computer that are attached
to a network .
• Server or Hub : The master
comp is called server, it facilitates
the sharing of data .
WHAT IS NETWORK INTERFACE UNIT (NIU) ?
• It is a device attached to each workstation and server.
• Helps to make connections within the network.
• Each NIU has a unique no identifying it called node address.
• NIU is also called terminal access point (TAP).
• Also called Network Interface Card (NIC).
• Each NIC is given a unique physical address called MAC
address.
HOW DATA IS TRANSMITTED ACROSS NETWORKS ?
Switching Techniques are used for transmitting data across networks.
3 types of switching techniques are there.
• Circuit Switching ,
• Message Switching ,
• Packet Switching .
TYPES OF NETWORKS
• Local Area Network - LAN
• Metropolitan Area Network – MAN
• Wide Area Network – WAN
• Personal Area Network - PAN
• Campus Area Network - CAN
TOPOLOGIES
The pattern of interconnection of nodes in a network is called the topology.
Types of TOPOLOGIES :-
•Bus Topology,
•Star Topology,
•Ring Topology,
•Tree Topology,
•Mesh Topology.
NETWORK DEVICE
•Modem ,
•RJ 45 Connector,
•Ethernet Card,
•Hub,
•Switch,
•Repeater,
•Bridge,
•Router.
TYPES OF NETWORK
Two classifications are
• Peer-to-Peer network :- * Nodes provide and request services *
User in each node administers resources * No extra investment *
Easy to setup * Very weak security * Additional load on nodes .
• Server based network :- * Designated computer to administer *
Resources centralized * Supports larger networks * Strong security *
Expensive .
OSI MODEL
OSI Reference Model
• Open Systems Interconnection
• No one really uses this in the real world.
• A reference model so others can develop
detailed interfaces .
• Value: The reference model defines 7 layers of
functions that take place at each end of
communication and with each layer adding its
own set of special related functions .
• Flow of data through each layer at one time.
NETWORK PROTOCOLS
• Protocol are used for communication between computers in different computer
networks. Protocol achieves : * What is communicated between computers? * How
it is communicated? * When it is communicated? * What conformance (bit
sequence) between computers?
• Key elements of a protocol are:
* SYNTAC: Data format and signal levels ,
* SEMANTICS: Control information for coordination and error handling , * TIMING:
Synchronization, speed matching, and sequencing .
• Examples of protocols: * WAN Protocol: TCP/IP .
THANK YOU

Mais conteúdo relacionado

Mais procurados

Cluster computing pptl (2)
Cluster computing pptl (2)Cluster computing pptl (2)
Cluster computing pptl (2)Rohit Jain
 
Cloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling TechnologiesCloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling TechnologiesAbdelkhalik Mosa
 
How Cloud Computing Works
How Cloud Computing WorksHow Cloud Computing Works
How Cloud Computing WorksJason Robinson
 
Cloud Computing Architecures
Cloud Computing ArchitecuresCloud Computing Architecures
Cloud Computing ArchitecuresAnne Starr
 
Application Delivery Platform Towards Edge Computing - Bukhary Ikhwan
Application Delivery Platform Towards Edge Computing - Bukhary IkhwanApplication Delivery Platform Towards Edge Computing - Bukhary Ikhwan
Application Delivery Platform Towards Edge Computing - Bukhary IkhwanOpenNebula Project
 
MidoNet Future -ミドネットの未来-
MidoNet Future -ミドネットの未来-MidoNet Future -ミドネットの未来-
MidoNet Future -ミドネットの未来-Midokura
 
Seminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaSeminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaPrashant Gupta
 
Evolution of Network Virtualization
Evolution of Network VirtualizationEvolution of Network Virtualization
Evolution of Network VirtualizationPavan Hasabnis
 
SECURITY, VIRTUALISATION AND INTEGRITY IN CLOUD COMPUTING
SECURITY, VIRTUALISATION AND INTEGRITY IN CLOUD COMPUTINGSECURITY, VIRTUALISATION AND INTEGRITY IN CLOUD COMPUTING
SECURITY, VIRTUALISATION AND INTEGRITY IN CLOUD COMPUTINGTannishtha Sengupta
 
Hybrid Virtual Machine-based SDN System in Cloud
Hybrid Virtual Machine-based SDN System in CloudHybrid Virtual Machine-based SDN System in Cloud
Hybrid Virtual Machine-based SDN System in CloudNam Yong Kim
 
Simulation of network through virtualization technique
Simulation of network through virtualization techniqueSimulation of network through virtualization technique
Simulation of network through virtualization techniquemonalissadeivasigamani
 
Networking course khurram shahzad
Networking course khurram shahzadNetworking course khurram shahzad
Networking course khurram shahzadkhurrak_shahzad
 
Network Virtualization Architectural & Technological aspects
Network Virtualization Architectural & Technological aspectsNetwork Virtualization Architectural & Technological aspects
Network Virtualization Architectural & Technological aspectsdeshpandeamrut
 

Mais procurados (20)

Cluster computing pptl (2)
Cluster computing pptl (2)Cluster computing pptl (2)
Cluster computing pptl (2)
 
Cloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling TechnologiesCloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling Technologies
 
Fog Computing: What, How and Why [Shakeeb A.]
Fog Computing: What, How and Why [Shakeeb A.]Fog Computing: What, How and Why [Shakeeb A.]
Fog Computing: What, How and Why [Shakeeb A.]
 
Network Virtualization
Network Virtualization Network Virtualization
Network Virtualization
 
How Cloud Computing Works
How Cloud Computing WorksHow Cloud Computing Works
How Cloud Computing Works
 
Peer to peer(p2 p)
Peer to peer(p2 p)Peer to peer(p2 p)
Peer to peer(p2 p)
 
Cloud Computing Architecures
Cloud Computing ArchitecuresCloud Computing Architecures
Cloud Computing Architecures
 
Networking by Mujahid Hussain
Networking by Mujahid HussainNetworking by Mujahid Hussain
Networking by Mujahid Hussain
 
Basics of cloud
Basics of cloudBasics of cloud
Basics of cloud
 
Application Delivery Platform Towards Edge Computing - Bukhary Ikhwan
Application Delivery Platform Towards Edge Computing - Bukhary IkhwanApplication Delivery Platform Towards Edge Computing - Bukhary Ikhwan
Application Delivery Platform Towards Edge Computing - Bukhary Ikhwan
 
MidoNet Future -ミドネットの未来-
MidoNet Future -ミドネットの未来-MidoNet Future -ミドネットの未来-
MidoNet Future -ミドネットの未来-
 
Seminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaSeminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant Gupta
 
Evolution of Network Virtualization
Evolution of Network VirtualizationEvolution of Network Virtualization
Evolution of Network Virtualization
 
Harshit.ppt
Harshit.pptHarshit.ppt
Harshit.ppt
 
Network Virtualization
Network VirtualizationNetwork Virtualization
Network Virtualization
 
SECURITY, VIRTUALISATION AND INTEGRITY IN CLOUD COMPUTING
SECURITY, VIRTUALISATION AND INTEGRITY IN CLOUD COMPUTINGSECURITY, VIRTUALISATION AND INTEGRITY IN CLOUD COMPUTING
SECURITY, VIRTUALISATION AND INTEGRITY IN CLOUD COMPUTING
 
Hybrid Virtual Machine-based SDN System in Cloud
Hybrid Virtual Machine-based SDN System in CloudHybrid Virtual Machine-based SDN System in Cloud
Hybrid Virtual Machine-based SDN System in Cloud
 
Simulation of network through virtualization technique
Simulation of network through virtualization techniqueSimulation of network through virtualization technique
Simulation of network through virtualization technique
 
Networking course khurram shahzad
Networking course khurram shahzadNetworking course khurram shahzad
Networking course khurram shahzad
 
Network Virtualization Architectural & Technological aspects
Network Virtualization Architectural & Technological aspectsNetwork Virtualization Architectural & Technological aspects
Network Virtualization Architectural & Technological aspects
 

Semelhante a Network Presentation

Computer Networking.pptx
Computer Networking.pptxComputer Networking.pptx
Computer Networking.pptxAnkita Shirke
 
CNE CHP1.pdf
CNE CHP1.pdfCNE CHP1.pdf
CNE CHP1.pdfNehaam3
 
KRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptxKRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptxADITYAKUMAR554673
 
Computer networkppt-110208141655-phpapp02
Computer networkppt-110208141655-phpapp02Computer networkppt-110208141655-phpapp02
Computer networkppt-110208141655-phpapp02DeShawn A. Larkin
 
info technology.pptx
info technology.pptxinfo technology.pptx
info technology.pptxssuser07362a
 
Web applications and security. By: Partha Jee Chauhan, MSc Computer Science
Web applications and security. By: Partha Jee Chauhan, MSc Computer ScienceWeb applications and security. By: Partha Jee Chauhan, MSc Computer Science
Web applications and security. By: Partha Jee Chauhan, MSc Computer SciencePartha Jee Chauhan
 
B5_WEEK 1_COMPUTER NETWORK.pptx
B5_WEEK 1_COMPUTER NETWORK.pptxB5_WEEK 1_COMPUTER NETWORK.pptx
B5_WEEK 1_COMPUTER NETWORK.pptxEmmanuelNYAMENAAYE
 
Module 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptxModule 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptxAASTHAJAJOO
 
Computer network and its topologies
Computer network and its topologiesComputer network and its topologies
Computer network and its topologiesAyush0734
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkAtika Zaimi
 
computer networking and its application ppt
computer networking and its application pptcomputer networking and its application ppt
computer networking and its application pptNitesh Dubey
 
Lecture 1 Computer Networks.pptxsecond course
Lecture 1 Computer Networks.pptxsecond courseLecture 1 Computer Networks.pptxsecond course
Lecture 1 Computer Networks.pptxsecond courseLamiyQurbanlKomptert
 
Computer networks
Computer networksComputer networks
Computer networkssamina khan
 

Semelhante a Network Presentation (20)

Computer Networking.pptx
Computer Networking.pptxComputer Networking.pptx
Computer Networking.pptx
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
NETWORKING PPT
NETWORKING PPTNETWORKING PPT
NETWORKING PPT
 
CNE CHP1.pdf
CNE CHP1.pdfCNE CHP1.pdf
CNE CHP1.pdf
 
KRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptxKRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptx
 
Computer networkppt-110208141655-phpapp02
Computer networkppt-110208141655-phpapp02Computer networkppt-110208141655-phpapp02
Computer networkppt-110208141655-phpapp02
 
computer-network.pptx
computer-network.pptxcomputer-network.pptx
computer-network.pptx
 
info technology.pptx
info technology.pptxinfo technology.pptx
info technology.pptx
 
Web applications and security. By: Partha Jee Chauhan, MSc Computer Science
Web applications and security. By: Partha Jee Chauhan, MSc Computer ScienceWeb applications and security. By: Partha Jee Chauhan, MSc Computer Science
Web applications and security. By: Partha Jee Chauhan, MSc Computer Science
 
B5_WEEK 1_COMPUTER NETWORK.pptx
B5_WEEK 1_COMPUTER NETWORK.pptxB5_WEEK 1_COMPUTER NETWORK.pptx
B5_WEEK 1_COMPUTER NETWORK.pptx
 
COMPUTER APPLICATIONS Module 3.pptx
COMPUTER APPLICATIONS Module 3.pptxCOMPUTER APPLICATIONS Module 3.pptx
COMPUTER APPLICATIONS Module 3.pptx
 
Module 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptxModule 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptx
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Computer network and its topologies
Computer network and its topologiesComputer network and its topologies
Computer network and its topologies
 
Computer network
Computer networkComputer network
Computer network
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer network
 
Computer networks
Computer networksComputer networks
Computer networks
 
computer networking and its application ppt
computer networking and its application pptcomputer networking and its application ppt
computer networking and its application ppt
 
Lecture 1 Computer Networks.pptxsecond course
Lecture 1 Computer Networks.pptxsecond courseLecture 1 Computer Networks.pptxsecond course
Lecture 1 Computer Networks.pptxsecond course
 
Computer networks
Computer networksComputer networks
Computer networks
 

Último

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Network Presentation

  • 2. WHAT IS A NETWORK ? • Network, in computer science, a group of computers and associated devices that are connected by communications facilities. • Network is an inter connected collection of autonomous computers. • When two or more computers are joined together so that they are capable of exchanging information , they form a network.
  • 3. NEED OF NETWORKING ? • Resource sharing - Through a network , data , s/w and h/w resources can be shared irrespective of the physical location of the resources and the user. • Reliability – A file can have its copies on two or more computers of the network. • Reduced Cost – Sharing resources reduces the cost • Fast Communication – Information can be exchanged at a very fast speed.
  • 4. WHAT IS INTERNET ? Internet is worldwide network of computer networks. How does it work ? • Most computers are not connected directly to the internet . • They are connected to smaller networks . • Which are connected through gateways to the internet backbone .
  • 5. WHAT IS A GATEWAY ? • Gateway is a device that connects dissimilar networks. • A backbone is a central interconnecting structure that connects one or more networks just like the trunk of a tree.
  • 6. FEW THINGS RELATED TO NETWORK • Workstation or Nodes : refers to a computer that are attached to a network . • Server or Hub : The master comp is called server, it facilitates the sharing of data .
  • 7. WHAT IS NETWORK INTERFACE UNIT (NIU) ? • It is a device attached to each workstation and server. • Helps to make connections within the network. • Each NIU has a unique no identifying it called node address. • NIU is also called terminal access point (TAP). • Also called Network Interface Card (NIC). • Each NIC is given a unique physical address called MAC address.
  • 8. HOW DATA IS TRANSMITTED ACROSS NETWORKS ? Switching Techniques are used for transmitting data across networks. 3 types of switching techniques are there. • Circuit Switching , • Message Switching , • Packet Switching .
  • 9. TYPES OF NETWORKS • Local Area Network - LAN • Metropolitan Area Network – MAN • Wide Area Network – WAN • Personal Area Network - PAN • Campus Area Network - CAN
  • 10. TOPOLOGIES The pattern of interconnection of nodes in a network is called the topology. Types of TOPOLOGIES :- •Bus Topology, •Star Topology, •Ring Topology, •Tree Topology, •Mesh Topology.
  • 11. NETWORK DEVICE •Modem , •RJ 45 Connector, •Ethernet Card, •Hub, •Switch, •Repeater, •Bridge, •Router.
  • 12. TYPES OF NETWORK Two classifications are • Peer-to-Peer network :- * Nodes provide and request services * User in each node administers resources * No extra investment * Easy to setup * Very weak security * Additional load on nodes . • Server based network :- * Designated computer to administer * Resources centralized * Supports larger networks * Strong security * Expensive .
  • 13. OSI MODEL OSI Reference Model • Open Systems Interconnection • No one really uses this in the real world. • A reference model so others can develop detailed interfaces . • Value: The reference model defines 7 layers of functions that take place at each end of communication and with each layer adding its own set of special related functions . • Flow of data through each layer at one time.
  • 14. NETWORK PROTOCOLS • Protocol are used for communication between computers in different computer networks. Protocol achieves : * What is communicated between computers? * How it is communicated? * When it is communicated? * What conformance (bit sequence) between computers? • Key elements of a protocol are: * SYNTAC: Data format and signal levels , * SEMANTICS: Control information for coordination and error handling , * TIMING: Synchronization, speed matching, and sequencing . • Examples of protocols: * WAN Protocol: TCP/IP .