SlideShare uma empresa Scribd logo
1 de 31
.
A computer network, often simply referred to as a
network, is a collection of computers and devices
interconnected by communications channels that facilitate
communications and allows sharing of resources and
information among interconnected devices. Put more simply,
a computer network is a collection of two or more
computers linked together for the purposes of sharing
information, resources, among other things. Computer
networking or Data Communications (Datacom) is the
engineering discipline concerned with computer networks.
Computer networking is sometimes considered a subdiscipline of electrical engineering, telecommunications,
computer science, information technology and/or
computer engineering since it relies heavily upon the
theoretical and practical application of these scientific and
engineering disciplines
Networks may be classified according to a wide variety of
characteristics such as medium used to transport the data,
communication protocol used, scale, topology,
organizational scope, etc.

A communications protocol defines the formats and rules for
exchanging information via a network. Well-known
communications protocols are Ethernet, which is a family of
protocols used in LANs, the Internet Protocol Suite, which is used
not only in the eponymous Internet, but today nearly ubiquitously in
any computer network
LocaL area network




A local area network (LAN) is a computer network
that connects computers and devices in a limited
geographical area such as home, school, computer
laboratory or office building. The defining
characteristics of LANs, in contrast to
wide area networks (WANs), include their usually
higher data-transfer rates, smaller geographic area,
and lack of a need for leased telecommunication lines.
ARCNET, Token Ring and other technology standards
have been used in the past, but Ethernet over
twisted pair cabling, and Wi-Fi are the two most
common technologies currently in use.


The development and proliferation of CP/Mbased personal computers from the late
1970s and then DOS-based
personal computers from 1981 meant that a
single site began to have dozens or even
hundreds of computers. The initial attraction
of networking these was generally to share
disk space and laser printers, which were
both very expensive at the time. There was
much enthusiasm for the concept and for
several years, from about 1983 onward,
computer industry pundits would regularly
declare the coming year to be “the year of
the LAN”.
ethernet


Ethernet is a family of connectionless protocols used in LANs,
described by a set of standards together called IEEE 802 published
by the Institute of Electrical and Electronics Engineers. It has a
flat addressing scheme and is mostly situated at levels 1 and 2 of
the OSI model. For home users today, the most well-known
member of this protocol family is IEEE 802.11, otherwise known
as Wireless LAN (WLAN). However, the complete protocol suite
deals with a multitude of networking aspects not only for home
use, but especially when the technology is deployed to support a
diverse range of business needs. MAC bridging (IEEE 802.1D)
deals with the routing of Ethernet packets using a
Spanning Tree Protocol, IEEE 802.1Q describes VLANs, and
IEEE 802.1X defines a port-basedNetwork Access Control protocol
which forms the basis for the authentication mechanisms used in
VLANs, but also found in WLANs - it is what the home user sees
when they have to enter a "wireless access key".






campus network
A campus network is a computer network made up of an
interconnection of LANs within a limited geographical area.
The networking equipment (switches, routers) and
transmission media (optical fiber, copper plant, Cat5 cabling
etc.) are almost entirely owned (by the campus tenant /
owner: an enterprise, university, government etc.).
In the case of a university campus-based campus network,
the network is likely to link a variety of campus buildings
including, for example, academic colleges or departments, the
university library, and student residence halls.






BackBone network
A Backbone network or network backbone is part of a computer 
network infrastructure that interconnects various pieces of 
network, providing a path for the exchange of information 
between different LANs or subnetworks. A backbone can tie 
together diverse networks in the same building, in different 
buildings in a campus environment, or over wide areas. Normally, 
the backbone's capacity is greater than that of the networks 
connected to it.
A large corporation which has many locations may have a 
backbone network that ties all of these locations together, for 
example, if a server cluster needs to be accessed by different 
departments of a company which are located at different 
geographical locations. The equipment which ties these 
departments together constitute the network backbone. 
Network performance management includingnetwork congestion
 are critical parameters taken into account when designing a 
network backbone.
Metropolitan area network

A Metropolitan area network (MAN) is a large computer network that 
usually spans a city or a large campus.





enterprise private network
An enterprise private network is a network built by an enterprise 
to interconnect various company sites, e.g., production sites, head 
offices, remote offices, shops, in order to share computer 
resources.




wide area network

A wide area network (WAN) is a computer network that 
covers a large geographic area such as a city, country, or 
spans even intercontinental distances, using a 
communications channel that combines many types of 
media such as telephone lines, cables, and air waves. A 
WAN often uses transmission facilities provided by common 
carriers, such as telephone companies. WAN technologies 
generally function at the lower three layers of the 
OSI reference model: the physical layer, the data link layer, 
and the network layer. Wide area network is formed by 
interconnecting LAN.






virtual private network
A virtual private network (VPN) is a computer network in which 
some of the links between nodes are carried by open connections 
or virtual circuits in some larger network (e.g., the Internet) 
instead of by physical wires. The data link layer protocols of the 
virtual network are said to be tunneled through the larger network 
when this is the case. One common application is secure 
communications through the public Internet, but a VPN need not 
have explicit security features, such as authentication or content 
encryption. VPNs, for example, can be used to separate the traffic 
of different user communities over an underlying network with 
strong security features.
VPN may have best-effort performance, or may have a defined 
service level agreement (SLA) between the VPN customer and the 
VPN service provider. Generally, a VPN has a topology more 
complex than point-to-point.



internet work
An internet work is the connection of two 
or more private computer networks via a 
common routing technology (OSI Layer 3) 
using routers. The Internet can be seen as 
a special case of an aggregation of many 
connected internet works spanning the 
whole earth. Another such global 
aggregation is the telephone network.
internet
The Internet is a global system of interconnected governmental,
academic, corporate, public, and private computer networks. In
other words, the Internet is a worldwide interconnection of
computers and networks which are either owned privately or
publicly. It is based on the networking technologies of the
Internet Protocol Suite. It is the successor of the
Advanced Research Projects Agency Network(ARPANET)
developed by DARPA of the
United States Department of Defense. The Internet is also the
communications backbone underlying the World Wide Web
(WWW).
Participants in the Internet use a diverse array of methods of
several hundred documented, and often standardized, protocols
compatible with the Internet Protocol Suite and an addressing
system (IP addresses) administered by the
Internet Assigned Numbers Authority and address registries.
Service providers and large enterprises exchange information
about the reachability of their address spaces through the
Border Gateway Protocol (BGP), forming a redundant worldwide







Basic hardware coMponents
Apart from the physical communications media themselves 
as described above, networks comprise additional basic 
hardware building blocks interconnecting their terminals, 
such as network interface cards (NICs), hubs, bridges, 
switches, and routers.
network interface cards
A network card, network adapter, or NIC (network interface 
card) is a piece of computer hardware designed to allow 
computers to physically access a networking medium. It 
provides a low-level addressing system through the use of 
MAC addresses.
Each Ethernet network interface has a unique MAC address 
which is usually stored in a small memory device on the 
card, allowing any device to connect to the network without 
creating an address conflict. Ethernet MAC addresses are 
composed of six octets. Uniqueness is maintained by the 
IEEE, which manages the Ethernet address space by 
assigning 3-octet prefixes to equipment manufacturers. 
The list of prefixes is publicly available. Each manufacturer 
is then obliged to both use only their assigned prefix(es) 
and to uniquely set the 3-octet suffix of every Ethernet 
interface they produce.






repeaters and huBs
A repeater is an electronic device that receives a signal, 
cleans it of unnecessary noise, regenerates it, and 
retransmits it at a higher power level, or to the other side 
of an obstruction, so that the signal can cover longer 
distances without degradation. In most twisted pair 
Ethernet configurations, repeaters are required for cable 
that runs longer than 100 meters. A repeater with multiple 
ports is known as a hub. Repeaters work on the Physical 
Layer of the OSI model. Repeaters require a small amount 
of time to regenerate the signal. This can cause a 
propagation delay which can affect network communication 
when there are several repeaters in a row. Many network 
architectures limit the number of repeaters that can be 
used in a row (e.g. Ethernet's 5-4-3 rule).
Today, repeaters and hubs have been made mostly 
obsolete by switches
Bridges
A network bridge connects multiple network segments at 
the data link layer (layer 2) of the OSI model. Bridges 
broadcast to all ports except the port on which the 
broadcast was received. However, bridges do not 
promiscuously copy traffic to all ports, as hubs do, but 
learn which MAC addresses are reachable through specific 
ports. Once the bridge associates a port and an address, it 
will send traffic for that address to that port only.
 Bridges learn the association of ports and addresses by 
examining the source address of frames that it sees on 
various ports. Once a frame arrives through a port, its 
source address is stored and the bridge assumes that MAC 
address is associated with that port. The first time that a 
previously unknown destination address is seen, the bridge 
will forward the frame to all ports other than the one on 
which the frame arrived.
Bridges come in three basic types:
 Local bridges: Directly connect LANs
 Remote bridges: Can be used to create a wide area 
network (WAN) link between LANs. Remote bridges, where 
the connecting link is slower than the end networks, largely 
have been replaced with routers.
 Wireless bridges: Can be used to join LANs or connect 
remote stations to LANs.

switches


A network switch is a device that forwards and filters 
OSI layer 2 datagrams (chunks of data 
communication) between ports (connected cables) 
based on the MAC addresses in the packets. A switch 
is distinct from a hub in that it only forwards the 
frames to the ports involved in the communication 
rather than all ports connected. A switch breaks the 
collision domain but represents itself as a broadcast 
domain. Switches make forwarding decisions of 
frames on the basis of MAC addresses. A switch 
normally has numerous ports, facilitating a star 
topology for devices, and cascading additional 
switches. Some switches are capable of routing based 
on Layer 3 addressing or additional logical levels; 
these are called multi-layer switches. The 
term switch is used loosely in marketing to encompass 
devices including routers and bridges, as well as 
devices that may distribute traffic on load or by 
application content (e.g., a Web URL identifier).


routers
A router is an internetworking device that forwards packets
 between networks by processing information found in the 
datagram or packet (Internet protocol information from 
Layer 3 of the OSI Model). In many situations, this 
information is processed in conjunction with the routing 
table (also known as forwarding table). Routers use routing 
tables to determine what interface to forward packets (this 
can include the "null" also known as the "black hole" 
interface because data can go into it, however, no further 
processing is done for said data).



Firewalls
A firewall is an important aspect of a network with respect 
to security. It typically rejects access requests from unsafe 
sources while allowing actions from recognized ones. The 
vital role firewalls play in network security grows in parallel 
with the constant increase in 'cyber' attacks for the purpose 
of stealing/corrupting data, planting viruses, etc.
coMPuter Virus
A computer virus is a computer program that can copy 
itself and infect a computer. The term "virus" is also 
commonly but erroneously used to refer to other types of 
malware, including but not limited to adware and spyware
 programs that do not have the reproductive ability. A true 
virus can spread from one computer to another (in some 
form of executable code) when its host is taken to the 
target computer; for instance because a user sent it over a 
network or the Internet, or carried it on a removable 
medium such as a floppy disk, CD, DVD, or USB drive.
   Viruses can increase their chances of spreading to other 
computers by infecting files on a network file system or a 
file system that is accessed by another computer.            
    As stated above, the term "computer virus" is sometimes 
used as a catch-all phrase to include all types of malware, 
even those that do not have the reproductive ability. 



Malware includes computer viruses, computer 
worms, Trojan horses, most rootkits, spyware, 
dishonest adware and other malicious and unwanted 
software, including true viruses. Viruses are sometimes 
confused with worms and Trojan horses, which are 
technically different. A worm can exploit 
security vulnerabilities to spread itself automatically to 
other computers through networks, while a Trojan horse is 
a program that appears harmless but hides malicious 
functions. Worms and Trojan horses, like viruses, may 
harm a computer system's data or performance. Some 
viruses and other malware have symptoms noticeable to 
the computer user, but many are surreptitious or simply do 
nothing to call attention to themselves. Some viruses do 
nothing beyond reproducing themselves.






E-mail viruses - An e-mail virus travels as an attachment to email messages, and usually replicates itself by automatically 
mailing itself to dozens of people in the victim's e-mail address 
book. Some e-mail viruses don't even require a double-click -- 
they launch when you view the infected message in the preview 
pane of your e-mail software [source: Johnson].
Trojan horses - A Trojan horse is simply a computer program. 
The program claims to do one thing (it may claim to be a game) 
but instead does damage when you run it (it may erase your  hard 
disk). Trojan horses have no way to replicate automatically.
Worms - A worm is a small piece of software that uses computer 
networks and security holes to replicate itself. A copy of the worm 
scans the network for another machine that has a specific security 
hole. It copies itself to the new machine using the security hole, 
and then starts replicating from there, as well.
how-to Protect against
coMPuter Viruses


1. Avoid Unknown
AttAchments .



Nowadays, most viruses are spread via email attachments which, thankfully, can
only become active when the attachment is
opened or unzipped. While you cannot
contract a virus just by receiving e-mail, it
is a good idea to delete messages
containing attachments if you do not
know the sender.


2. Avoid Bootleg or PirAted
softwAre.



With popular software packages running
upwards of $200, it can be hard to resist
the lure of the bootleg versions freely
available on Internet file sharing utilities
such as FreeNet and Gnutella. 
Virus writers take advantage of the
insatiable market for bootlegs to
disseminate their creations across the
Internet and around the world.




3. TreaT Floppy Disks anD CDs WiTh
suspiCion. 



Prior to the mid-1990s, most computer viruses
were spread via infected floppy disks. While
floppy disks aren't inherently evil, as they
pass  through many hands and many computers,
they have  an increasingly greater chance of
becoming infected by a virus - one that will then
infest your system. New technologies such as CD
burners (recorders) also open new doors for viruses
to slip through. Homemade CD-RW disks (CDs
which can be re-written using a burner) with
unknown pedigrees can also be a source of


4. BaCk iT up. 



 Along with hardware failure, theft and acts of God or
Nature, the possibility of viral infection is just one more
reason to back up your data regularly.  For Windows users,
once you have chosen a backup medium (floppy disk, zip
disk, CD-RW, tape drive), you can set up the Task
Scheduler in Windows 95/98 to perform automatic backups
on a daily, weekly or monthly basis. Still, you should
always keep the last and the next-to-the-last backups in case
you need to restore files that have been corrupted. 


5. purChase anTivirus
soFTWare. 



Most antivirus software packages offer an
automatic background protection mode,
which will detect and clean out infections
as they appear. If you don’t have this
option, be sure to use the software to scan
any and all Internet downloads, e-mail
attachments and foreign disks before you
open or run them. (More information on
antiviral software is coming up in the next
sections.) 




6. CheCk sysTem requiremenTs.
 The last thing you need is to trek out, buy the
software, trek back, try to install it and get a
nasty error message saying "Unable to install
program. You need Windows version XYZ." For
example, the Windows 98 version of Symantec's
Norton AntiVirus may not work on an NT 2000
system. Make sure you check the minimum
system requirements and platform on the package
before you buy to make sure you get the right
version. 






7. sCan all Drives .

 Once you've purchased and installed the software, schedule
regular scans. Most virus scan programs are set to
automatically scan the C: Drive first. It's easy to think
you're home free when no viruses are found. Make sure you
set the program to check all drives, including e-mail
programs, as many viruses are delivered through e-mail
attachments and Internet files, and spread through shared
documents. 


8. upDaTe oFTen.



  For optimum protection, antivirus software
must be updated on a monthly basis so that
it can recognize and eradicate new bugs as
they make the rounds. The updates can
usually be found on the software
company’s Web site, but if you need
reminding, many packages will allow you
to schedule automatic updates. Still, you
should never assume that your antiviral
software offers complete protection from
infection, and you should continue to take
basic safe computing  precautions
CREDITS

DESIGNED BY
SHIV KUMAR . V
THANKS TO
USHA RAM MAM

Mais conteúdo relacionado

Mais procurados

Extended definition
Extended definitionExtended definition
Extended definitiontcassa
 
Computer network
Computer networkComputer network
Computer networkRohit Gupta
 
Data Communication and Computer Network Overview
Data Communication and Computer Network Overview Data Communication and Computer Network Overview
Data Communication and Computer Network Overview RANVIJAY GAUR
 
A seminar on networks and networking
A seminar on networks and networkingA seminar on networks and networking
A seminar on networks and networkingNAGASHREE C
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networkingZaeem Hassan
 
Introduction to Computer Networks: Basic concept of Computer networks Goals o...
Introduction to Computer Networks: Basic concept of Computer networks Goals o...Introduction to Computer Networks: Basic concept of Computer networks Goals o...
Introduction to Computer Networks: Basic concept of Computer networks Goals o...MostafizurRahmanMonn
 
Computer Networks Basics
Computer Networks BasicsComputer Networks Basics
Computer Networks Basicsijtsrd
 
Computer network
Computer networkComputer network
Computer networkMd Saylab
 
Dotson - Network Tutorial
Dotson - Network TutorialDotson - Network Tutorial
Dotson - Network TutorialBOXLIGHT Inc
 
Networking Basics and Cisco
Networking Basics and CiscoNetworking Basics and Cisco
Networking Basics and CiscoShoaib Iqbal
 
Introduction to Computer Networking - School level
Introduction to Computer Networking - School level Introduction to Computer Networking - School level
Introduction to Computer Networking - School level Matthew Bulat
 
Seminar report-networking
Seminar report-networkingSeminar report-networking
Seminar report-networkingJyoti Kumari
 

Mais procurados (20)

Network Notes
Network Notes Network Notes
Network Notes
 
Extended definition
Extended definitionExtended definition
Extended definition
 
Computer network
Computer networkComputer network
Computer network
 
Data Communication and Computer Network Overview
Data Communication and Computer Network Overview Data Communication and Computer Network Overview
Data Communication and Computer Network Overview
 
A seminar on networks and networking
A seminar on networks and networkingA seminar on networks and networking
A seminar on networks and networking
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networking
 
Afeche nettech
Afeche nettechAfeche nettech
Afeche nettech
 
Computer classification
Computer classificationComputer classification
Computer classification
 
Introduction to Computer Networks: Basic concept of Computer networks Goals o...
Introduction to Computer Networks: Basic concept of Computer networks Goals o...Introduction to Computer Networks: Basic concept of Computer networks Goals o...
Introduction to Computer Networks: Basic concept of Computer networks Goals o...
 
Computer Networks Basics
Computer Networks BasicsComputer Networks Basics
Computer Networks Basics
 
Computer network
Computer networkComputer network
Computer network
 
Types of network
Types of networkTypes of network
Types of network
 
Dotson - Network Tutorial
Dotson - Network TutorialDotson - Network Tutorial
Dotson - Network Tutorial
 
1 computer networks basic
1 computer networks basic1 computer networks basic
1 computer networks basic
 
Lan
LanLan
Lan
 
Networking Basics and Cisco
Networking Basics and CiscoNetworking Basics and Cisco
Networking Basics and Cisco
 
Networking fundamentalsss
Networking fundamentalsssNetworking fundamentalsss
Networking fundamentalsss
 
Computer network
Computer networkComputer network
Computer network
 
Introduction to Computer Networking - School level
Introduction to Computer Networking - School level Introduction to Computer Networking - School level
Introduction to Computer Networking - School level
 
Seminar report-networking
Seminar report-networkingSeminar report-networking
Seminar report-networking
 

Destaque

Michael Jackson
Michael JacksonMichael Jackson
Michael JacksonShiv Kumar
 
Les chocolats-par-swiss
Les chocolats-par-swissLes chocolats-par-swiss
Les chocolats-par-swissPIagency
 
Mapa final
Mapa finalMapa final
Mapa finaldgrm123
 
Un dia de amigas!
Un dia de amigas!Un dia de amigas!
Un dia de amigas!soph3011
 
Eolfc 2013 kfla health unit - regulations considerations in local food proc...
Eolfc 2013   kfla health unit - regulations considerations in local food proc...Eolfc 2013   kfla health unit - regulations considerations in local food proc...
Eolfc 2013 kfla health unit - regulations considerations in local food proc...Eastern Ontario Local Food Conference
 
Infograma de los Pug
Infograma de los Pug Infograma de los Pug
Infograma de los Pug LuisaFMH
 
Contação de História - Prof Julio Sbarrais
Contação de História - Prof Julio SbarraisContação de História - Prof Julio Sbarrais
Contação de História - Prof Julio SbarraisSonia Ferreira
 
Endocrine glands3919 2
Endocrine glands3919 2Endocrine glands3919 2
Endocrine glands3919 2Joseph kutty
 
Gingivaland papillary.comp
Gingivaland papillary.compGingivaland papillary.comp
Gingivaland papillary.compDara Pich
 

Destaque (20)

Michael Jackson
Michael JacksonMichael Jackson
Michael Jackson
 
New wordpad document
New wordpad documentNew wordpad document
New wordpad document
 
Publicación1
Publicación1Publicación1
Publicación1
 
Les chocolats-par-swiss
Les chocolats-par-swissLes chocolats-par-swiss
Les chocolats-par-swiss
 
Mapa final
Mapa finalMapa final
Mapa final
 
Un dia de amigas!
Un dia de amigas!Un dia de amigas!
Un dia de amigas!
 
Eolfc 2013 kfla health unit - regulations considerations in local food proc...
Eolfc 2013   kfla health unit - regulations considerations in local food proc...Eolfc 2013   kfla health unit - regulations considerations in local food proc...
Eolfc 2013 kfla health unit - regulations considerations in local food proc...
 
Infograma de los Pug
Infograma de los Pug Infograma de los Pug
Infograma de los Pug
 
Experimentos em Economia
Experimentos em EconomiaExperimentos em Economia
Experimentos em Economia
 
Quem você conhece?
Quem você conhece?Quem você conhece?
Quem você conhece?
 
Aditya Resume
Aditya ResumeAditya Resume
Aditya Resume
 
General Quiz
  General Quiz   General Quiz
General Quiz
 
Contação de História - Prof Julio Sbarrais
Contação de História - Prof Julio SbarraisContação de História - Prof Julio Sbarrais
Contação de História - Prof Julio Sbarrais
 
Curso online tecnicas de comunicacao escrita
Curso online tecnicas de comunicacao escritaCurso online tecnicas de comunicacao escrita
Curso online tecnicas de comunicacao escrita
 
Finance Quiz
 Finance Quiz Finance Quiz
Finance Quiz
 
Endocrine glands3919 2
Endocrine glands3919 2Endocrine glands3919 2
Endocrine glands3919 2
 
Finance Quiz
Finance QuizFinance Quiz
Finance Quiz
 
Gingivaland papillary.comp
Gingivaland papillary.compGingivaland papillary.comp
Gingivaland papillary.comp
 
General quiz
General quiz General quiz
General quiz
 
Planning in India
Planning in IndiaPlanning in India
Planning in India
 

Semelhante a Networking

1 presentation copy
1 presentation   copy1 presentation   copy
1 presentation copyNikhil Mace
 
Computer networks and its components by narender singh sandhu
Computer networks and its components by narender singh sandhuComputer networks and its components by narender singh sandhu
Computer networks and its components by narender singh sandhuNARENDER SINGH
 
Computer networks and its components by narender singh sandhu
Computer networks and its components by narender singh sandhuComputer networks and its components by narender singh sandhu
Computer networks and its components by narender singh sandhuNarenderSinghSandhu2
 
Network ppt
Network pptNetwork ppt
Network ppthlalu861
 
Computer Networks
Computer NetworksComputer Networks
Computer Networksguestf10d8f
 
What is networking
What is networkingWhat is networking
What is networkingbabyparul
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKINGRozinaMemon1
 
fundamental of information technology(1)
fundamental of information technology(1)fundamental of information technology(1)
fundamental of information technology(1)Sorath Peetamber
 
Network & Networking
Network & NetworkingNetwork & Networking
Network & NetworkingGohil Anshu
 
CSS L11 INTRODUCTION TO COMPUTER NETWORKING
CSS L11 INTRODUCTION TO COMPUTER NETWORKINGCSS L11 INTRODUCTION TO COMPUTER NETWORKING
CSS L11 INTRODUCTION TO COMPUTER NETWORKINGMarvin Bronoso
 
CSS L11 - INTRODUCTION TO COMPUTER NETWORKS
CSS L11 - INTRODUCTION TO COMPUTER NETWORKSCSS L11 - INTRODUCTION TO COMPUTER NETWORKS
CSS L11 - INTRODUCTION TO COMPUTER NETWORKSMarvin Bronoso
 
Networking concepts
Networking conceptsNetworking concepts
Networking conceptsritajindal2
 
Networking concepts
Networking conceptsNetworking concepts
Networking conceptsseemadav1
 

Semelhante a Networking (20)

1 presentation copy
1 presentation   copy1 presentation   copy
1 presentation copy
 
Computer networks and its components by narender singh sandhu
Computer networks and its components by narender singh sandhuComputer networks and its components by narender singh sandhu
Computer networks and its components by narender singh sandhu
 
Computer networks and its components by narender singh sandhu
Computer networks and its components by narender singh sandhuComputer networks and its components by narender singh sandhu
Computer networks and its components by narender singh sandhu
 
Network ppt
Network pptNetwork ppt
Network ppt
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
What is networking
What is networkingWhat is networking
What is networking
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 
Com
ComCom
Com
 
A computer network
A computer networkA computer network
A computer network
 
Networking
NetworkingNetworking
Networking
 
fundamental of information technology(1)
fundamental of information technology(1)fundamental of information technology(1)
fundamental of information technology(1)
 
Network & Networking
Network & NetworkingNetwork & Networking
Network & Networking
 
CSS L11 INTRODUCTION TO COMPUTER NETWORKING
CSS L11 INTRODUCTION TO COMPUTER NETWORKINGCSS L11 INTRODUCTION TO COMPUTER NETWORKING
CSS L11 INTRODUCTION TO COMPUTER NETWORKING
 
CSS L11 - INTRODUCTION TO COMPUTER NETWORKS
CSS L11 - INTRODUCTION TO COMPUTER NETWORKSCSS L11 - INTRODUCTION TO COMPUTER NETWORKS
CSS L11 - INTRODUCTION TO COMPUTER NETWORKS
 
Computer networks--networking
Computer networks--networkingComputer networks--networking
Computer networks--networking
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Computer Network - Unit 1
Computer Network - Unit 1Computer Network - Unit 1
Computer Network - Unit 1
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
Lan
LanLan
Lan
 

Último

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 

Último (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

Networking