SlideShare uma empresa Scribd logo
1 de 28
PRESENTED BY
SIMRAN KAUR
• A collection of computers (or computer like devices) that
are able to communicate with each other through some
medium, using hardware and software
• Two computers (or computer like devices) are said to be
connected, if they are able to exchange information or
able to communicate
• Simplex : Data transfer only in one direction. Example,
radio broadcasting
• Half duplex : Data transfer in both directions, but not
simultaneously, i.e., in one direction at a time. Example,
talk back radio, CB radio (citizen band)
• Full duplex : Data transfer in both directions,
simultaneously. Example, telephone
• Data source : Provides the data to transmit
• Sender/Transmitter : Converts data to signals for
transmission
• Data Transmission System : Transmits the data, i.e.,
converted in signals
• Receiver : Converts received signals to data
• Destination : Receives and uses incoming data
• Node : A device with independent communication ability
and unique network address
• Protocol : A formal description, comprising rules and
conventions defines the method of communication
between networking devices
• Unicast : One device sends message to the other to its
address
• Broadcast : One device sends message to all other
devices on the network. The message is sent to an
address reserved for this goal
• Multicast : One device sends message to a certain
group of devices on the network
• There are three types of networks:
1. Local Area Network (LAN)
2. Metropolitan Area Network (MAN)
3. Wide Area Network (WAN)
• LAN is privately owned network within a single building or
campus
• LANs can be small, linking as few as three computers,
but often link hundreds of computers used by thousands
of people (like in some IT office, etc)
• A metropolitan area network (MAN) covers a city
• An example of MAN is cable television network in city
• A wide area network or WAN spans a large geographical
area often a country
• Internet is also known as network of networks
• It is a system of linked networks that are world wide in
scope and facilitate data communication services such as
remote login, file transfer, electronic mail, world wide web
and newsgroups, etc
• Network topology is the arrangement of the various
elements of a computer or biological network
• It is the topological structure of a network, and may be
depicted physically or logically
• Physical topology refers to the placement of the
network’s various components, inducing device location
and cable installation
• Logical topology shows how data flows within a network,
regardless of its physical design
• In bus topology, each node (computer server, other
computer like devices) is directly connected to a common
cable
• At the first, the message will go through the bus then one
user can communicate with other
• In this topology, each node has a dedicated set of wires
connecting it to a central network hub
• First the message will go to the hub then that message
will go to other user
• A ring topology features a logically closed loop.
• Data packets travel in a single direction around the ring
from one network device to the next
• Each network device acts as a repeater to keep the
signal strong enough as it travels
• In mesh topology, each system is connected to all other
systems in the network
• Any user can directly communicate with other users
• In this type of network topology, in which a central root is
connected to two or more nodes that are one level lower
in hierarchy
• Networking hardware may also be known as network
equipment , computer networking devices
• Some of the important networking devices include
1. Network Interface Card (NIC)
2. Repeater
3. Bridge
4. Switch
5. Routers
6. Gateway
7. Ethernet
8. Fibre Distributed Data Interface (FDDI)
• NIC provides a physical connection between the
networking cable and the computer’s internal bus
• NICs comes in three basic varieties 8 bit, 16 bit and 32
bit
• The larger the number of bits that can be transferred to
NIC, the faster the NIC can transfer data to network cable
• Repeaters are used to connect together two Ethernet
segments of any media type.
• They provide the signal amplification required to allow a
segment (cable) to be extended a greater distance
• A typical repeater has just 2 ports
• Bridges map the addresses of the nodes residing on
each network segment and allow only necessary traffic to
pass through bridge
• The function of the bridge is to connect separate
networks together
• Bridges do not forward bad or misaligned packets
• Switches are an expansion of concept of bridging
• LAN switches can link 4, 6, 10 or more networks together
• Switches have 2 basic architectures : cut through and
store-and-forward
• It alleviates congestion in Ethernet LAN by reducing
traffic and increasing bandwidth
• Routers forward packets from one LAN (or WAN) network
to another
• It is used at the edges of the networks to connect to the
Internet
• Gateway acts like an entrance between two different
networks.
• It is the computer that routes the traffic from a workstation
to the outside network that is serving web pages.
• ISP (Internet Service Provider) is the gateway for Internet
service at homes.
• IEEE 802.2 : Logical Link Control (LLC)
• IEEE 802.3 : Ethernet
• IEEE 802.5 : Token Ring
• IEEE 802.11 : Wireless LAN
• IEEE 802.15 : Bluetooth
• IEEE 802.16 : Wireless MAN
• IEEE Standard 802.3 defines Ethernet, rules for
configuring Ethernet network as well as specify how
elements in an Ethernet network interact with each other
• It uses Carrier Sense Multiple Access/Collision Detect
(CSMA/CD) technology broadcasting each from onto the
physical medium (wire fibre and so on)
• All stations attached to Ethernet listen to the line for traffic
and the station with the matching destination MAC
address accepts the frame
• Token Ring is a form of network configuration in which all
messages are transferred in an unidirectional manner
along the ring at all the times
• Medium Access Control (MAC) is provided by a small
frame, the token that circulates around the ring when all
stations are idle. Only the station (node) possessing the
token is allowed to transmit at any given time
• It can connect upto 255 nodes in a physical star or ring
connection that can sustain 4 or 16 Mbps
• FDDI is a form of network configuration, uses ring
topology of multimedia or single mode optical fibre
transmission links
• It operates at 100 Mbps to span upto 200km and permits
upto 500 stations
• It employs dual counter rotating rings
• 16 and 48 bit addresses are allowed
• Token is absorbed by station and released as soon as it
completes the frame transmission
Computer network

Mais conteúdo relacionado

Mais procurados

Dcn(data communication and computer network)
Dcn(data communication and computer network)Dcn(data communication and computer network)
Dcn(data communication and computer network)Ramakrishna kapa
 
Types of Computer Network
Types of Computer NetworkTypes of Computer Network
Types of Computer NetworkMohit Dasariya
 
switching techniques in data communication and networking
switching techniques in data communication and networkingswitching techniques in data communication and networking
switching techniques in data communication and networkingHarshita Yadav
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Divya Tiwari
 
Presentation on Transmission Media
Presentation on Transmission MediaPresentation on Transmission Media
Presentation on Transmission MediaSyed Ahmed Zaki
 
Basics of Networks ,Advantages and Disadvantages
Basics of  Networks ,Advantages and DisadvantagesBasics of  Networks ,Advantages and Disadvantages
Basics of Networks ,Advantages and Disadvantagessabari Giri
 
Networking devices
Networking devicesNetworking devices
Networking devicesrupinderj
 
Wireless transmission
Wireless transmissionWireless transmission
Wireless transmissionRajapriya82
 
PPT on Basic of Gateway
PPT on Basic of GatewayPPT on Basic of Gateway
PPT on Basic of GatewayNaveen Karn
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking FundamentalsManjit Chavda
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking FundamentalsRajet Veshin
 
WIRELESS ATM BY SAIKIRAN PANJALA
WIRELESS ATM BY SAIKIRAN PANJALAWIRELESS ATM BY SAIKIRAN PANJALA
WIRELESS ATM BY SAIKIRAN PANJALASaikiran Panjala
 
Unit 1 introduction to computer networks
Unit 1  introduction to computer networksUnit 1  introduction to computer networks
Unit 1 introduction to computer networkspavan kumar Thatikonda
 
Computer Networking fundamentals
Computer Networking fundamentals Computer Networking fundamentals
Computer Networking fundamentals Kirti Verma
 

Mais procurados (20)

Dcn(data communication and computer network)
Dcn(data communication and computer network)Dcn(data communication and computer network)
Dcn(data communication and computer network)
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
Types of Computer Network
Types of Computer NetworkTypes of Computer Network
Types of Computer Network
 
switching techniques in data communication and networking
switching techniques in data communication and networkingswitching techniques in data communication and networking
switching techniques in data communication and networking
 
Networkingconcepts
NetworkingconceptsNetworkingconcepts
Networkingconcepts
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
 
Physical Layer
Physical LayerPhysical Layer
Physical Layer
 
Presentation on Transmission Media
Presentation on Transmission MediaPresentation on Transmission Media
Presentation on Transmission Media
 
Basics of Networks ,Advantages and Disadvantages
Basics of  Networks ,Advantages and DisadvantagesBasics of  Networks ,Advantages and Disadvantages
Basics of Networks ,Advantages and Disadvantages
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Wireless transmission
Wireless transmissionWireless transmission
Wireless transmission
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
 
PPT on Basic of Gateway
PPT on Basic of GatewayPPT on Basic of Gateway
PPT on Basic of Gateway
 
computer network OSI layer
computer network OSI layercomputer network OSI layer
computer network OSI layer
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
Ethernet
EthernetEthernet
Ethernet
 
WIRELESS ATM BY SAIKIRAN PANJALA
WIRELESS ATM BY SAIKIRAN PANJALAWIRELESS ATM BY SAIKIRAN PANJALA
WIRELESS ATM BY SAIKIRAN PANJALA
 
Unit 1 introduction to computer networks
Unit 1  introduction to computer networksUnit 1  introduction to computer networks
Unit 1 introduction to computer networks
 
Computer Networking fundamentals
Computer Networking fundamentals Computer Networking fundamentals
Computer Networking fundamentals
 

Destaque

Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer NetworkingHj Habib
 
Computer Network | BBA First Semester
Computer Network | BBA First SemesterComputer Network | BBA First Semester
Computer Network | BBA First SemesterHem Pokhrel
 
The Power of Deep Learning in Content Analysis
The Power of Deep Learning in Content AnalysisThe Power of Deep Learning in Content Analysis
The Power of Deep Learning in Content AnalysisMichael Weber
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer networkAshita Agrawal
 
Database management system
Database management systemDatabase management system
Database management systemSimran Kaur
 
CBSE XII Communication And Network Concepts
CBSE XII Communication And Network ConceptsCBSE XII Communication And Network Concepts
CBSE XII Communication And Network ConceptsGuru Ji
 
Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic conceptsrahul kapoliya
 
Computer Network
Computer NetworkComputer Network
Computer NetworkCma Mohd
 
Machine Learning and Big Data for Music Discovery at Spotify
Machine Learning and Big Data for Music Discovery at SpotifyMachine Learning and Big Data for Music Discovery at Spotify
Machine Learning and Big Data for Music Discovery at SpotifyChing-Wei Chen
 
Office365のID基盤活用とセキュリティ上の注意点
Office365のID基盤活用とセキュリティ上の注意点Office365のID基盤活用とセキュリティ上の注意点
Office365のID基盤活用とセキュリティ上の注意点Naohiro Fujie
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS Kak Yong
 
Database management system presentation
Database management system presentationDatabase management system presentation
Database management system presentationsameerraaj
 
The Power of the Log
The Power of the LogThe Power of the Log
The Power of the LogBen Stopford
 
Workshop: Docker on Elastic Beanstalk
Workshop: Docker on Elastic BeanstalkWorkshop: Docker on Elastic Beanstalk
Workshop: Docker on Elastic Beanstalk輝 子安
 
Developing an Intranet Strategy
Developing an Intranet StrategyDeveloping an Intranet Strategy
Developing an Intranet StrategyDNN
 
Russian artist Alexei Savrasov, "The lyrical landscape artist"
Russian artist Alexei Savrasov, "The lyrical landscape artist"Russian artist Alexei Savrasov, "The lyrical landscape artist"
Russian artist Alexei Savrasov, "The lyrical landscape artist"Makala (D)
 
Real Estate Marketing Through Story Telling 101 | Matthew Rathbun
Real Estate Marketing Through Story Telling 101 | Matthew RathbunReal Estate Marketing Through Story Telling 101 | Matthew Rathbun
Real Estate Marketing Through Story Telling 101 | Matthew RathbunMatthew Rathbun
 

Destaque (20)

Networking
NetworkingNetworking
Networking
 
Computer network ppt
Computer network pptComputer network ppt
Computer network ppt
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer Networking
 
Computer Network | BBA First Semester
Computer Network | BBA First SemesterComputer Network | BBA First Semester
Computer Network | BBA First Semester
 
The Power of Deep Learning in Content Analysis
The Power of Deep Learning in Content AnalysisThe Power of Deep Learning in Content Analysis
The Power of Deep Learning in Content Analysis
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
Database management system
Database management systemDatabase management system
Database management system
 
CBSE XII Communication And Network Concepts
CBSE XII Communication And Network ConceptsCBSE XII Communication And Network Concepts
CBSE XII Communication And Network Concepts
 
Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic concepts
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Machine Learning and Big Data for Music Discovery at Spotify
Machine Learning and Big Data for Music Discovery at SpotifyMachine Learning and Big Data for Music Discovery at Spotify
Machine Learning and Big Data for Music Discovery at Spotify
 
Office365のID基盤活用とセキュリティ上の注意点
Office365のID基盤活用とセキュリティ上の注意点Office365のID基盤活用とセキュリティ上の注意点
Office365のID基盤活用とセキュリティ上の注意点
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
 
Dbms slides
Dbms slidesDbms slides
Dbms slides
 
Database management system presentation
Database management system presentationDatabase management system presentation
Database management system presentation
 
The Power of the Log
The Power of the LogThe Power of the Log
The Power of the Log
 
Workshop: Docker on Elastic Beanstalk
Workshop: Docker on Elastic BeanstalkWorkshop: Docker on Elastic Beanstalk
Workshop: Docker on Elastic Beanstalk
 
Developing an Intranet Strategy
Developing an Intranet StrategyDeveloping an Intranet Strategy
Developing an Intranet Strategy
 
Russian artist Alexei Savrasov, "The lyrical landscape artist"
Russian artist Alexei Savrasov, "The lyrical landscape artist"Russian artist Alexei Savrasov, "The lyrical landscape artist"
Russian artist Alexei Savrasov, "The lyrical landscape artist"
 
Real Estate Marketing Through Story Telling 101 | Matthew Rathbun
Real Estate Marketing Through Story Telling 101 | Matthew RathbunReal Estate Marketing Through Story Telling 101 | Matthew Rathbun
Real Estate Marketing Through Story Telling 101 | Matthew Rathbun
 

Semelhante a Computer network

12 ipt 0303 transmitting and receiving
12 ipt 0303   transmitting and receiving12 ipt 0303   transmitting and receiving
12 ipt 0303 transmitting and receivingctedds
 
Computer network and email basic concepts
Computer network and email basic conceptsComputer network and email basic concepts
Computer network and email basic conceptsMd Irfan Ansari
 
Networking_and_Data_communication.pptx
Networking_and_Data_communication.pptxNetworking_and_Data_communication.pptx
Networking_and_Data_communication.pptxUniversity of Lucknow
 
Data communications_Network_Model (1).pdf
Data communications_Network_Model (1).pdfData communications_Network_Model (1).pdf
Data communications_Network_Model (1).pdfSujanTimalsina5
 
is chap5.pptx
is chap5.pptxis chap5.pptx
is chap5.pptxTeshome48
 
Networking Basic Refresh.pdf
Networking Basic Refresh.pdfNetworking Basic Refresh.pdf
Networking Basic Refresh.pdfCS Knowledge
 
Computer networks
Computer networksComputer networks
Computer networkssamina khan
 
Networking presentation
Networking presentationNetworking presentation
Networking presentationJyoti Tewari
 
Computer networks
Computer networksComputer networks
Computer networksTej Kiran
 
Network fundamental
Network fundamentalNetwork fundamental
Network fundamentalsravya reddy
 
Computer networks basic network_hardware_1
Computer networks basic network_hardware_1Computer networks basic network_hardware_1
Computer networks basic network_hardware_1Aneesh Nelavelly
 
Basics Of Networking and routing.ppt
Basics Of Networking and routing.pptBasics Of Networking and routing.ppt
Basics Of Networking and routing.pptNiharikaDubey17
 
Chapter06 -- topologies and access methods
Chapter06  -- topologies and access methodsChapter06  -- topologies and access methods
Chapter06 -- topologies and access methodsRaja Waseem Akhtar
 

Semelhante a Computer network (20)

Networking basics
Networking basicsNetworking basics
Networking basics
 
12 ipt 0303 transmitting and receiving
12 ipt 0303   transmitting and receiving12 ipt 0303   transmitting and receiving
12 ipt 0303 transmitting and receiving
 
Computer network and email basic concepts
Computer network and email basic conceptsComputer network and email basic concepts
Computer network and email basic concepts
 
COMPUTER APPLICATIONS Module 3.pptx
COMPUTER APPLICATIONS Module 3.pptxCOMPUTER APPLICATIONS Module 3.pptx
COMPUTER APPLICATIONS Module 3.pptx
 
Networking_and_Data_communication.pptx
Networking_and_Data_communication.pptxNetworking_and_Data_communication.pptx
Networking_and_Data_communication.pptx
 
lecture 2.pptx
lecture 2.pptxlecture 2.pptx
lecture 2.pptx
 
Data communications_Network_Model (1).pdf
Data communications_Network_Model (1).pdfData communications_Network_Model (1).pdf
Data communications_Network_Model (1).pdf
 
is chap5.pptx
is chap5.pptxis chap5.pptx
is chap5.pptx
 
Networking Basic Refresh.pdf
Networking Basic Refresh.pdfNetworking Basic Refresh.pdf
Networking Basic Refresh.pdf
 
Computer networks
Computer networksComputer networks
Computer networks
 
Networking presentation
Networking presentationNetworking presentation
Networking presentation
 
Computer networks
Computer networksComputer networks
Computer networks
 
Communications
CommunicationsCommunications
Communications
 
Network Devices
Network DevicesNetwork Devices
Network Devices
 
Network fundamental
Network fundamentalNetwork fundamental
Network fundamental
 
Network use and configuration
Network use and configurationNetwork use and configuration
Network use and configuration
 
Computer networks basic network_hardware_1
Computer networks basic network_hardware_1Computer networks basic network_hardware_1
Computer networks basic network_hardware_1
 
Basics Of Networking and routing.ppt
Basics Of Networking and routing.pptBasics Of Networking and routing.ppt
Basics Of Networking and routing.ppt
 
computer-network.pptx
computer-network.pptxcomputer-network.pptx
computer-network.pptx
 
Chapter06 -- topologies and access methods
Chapter06  -- topologies and access methodsChapter06  -- topologies and access methods
Chapter06 -- topologies and access methods
 

Mais de Simran Kaur

Corporate social relationship as responsibility
Corporate social relationship as responsibilityCorporate social relationship as responsibility
Corporate social relationship as responsibilitySimran Kaur
 
Teaching aptitude
Teaching aptitudeTeaching aptitude
Teaching aptitudeSimran Kaur
 
Direct & indirect speech
Direct & indirect speechDirect & indirect speech
Direct & indirect speechSimran Kaur
 
Active & Passive Voice
Active & Passive VoiceActive & Passive Voice
Active & Passive VoiceSimran Kaur
 
Software development life cycle (SDLC)
Software development life cycle (SDLC)Software development life cycle (SDLC)
Software development life cycle (SDLC)Simran Kaur
 
Pricing Strategy
Pricing StrategyPricing Strategy
Pricing StrategySimran Kaur
 
Marketing research
Marketing researchMarketing research
Marketing researchSimran Kaur
 
Theories of entrepreneurship
Theories of entrepreneurshipTheories of entrepreneurship
Theories of entrepreneurshipSimran Kaur
 
Software testing
Software testingSoftware testing
Software testingSimran Kaur
 

Mais de Simran Kaur (20)

Corporate social relationship as responsibility
Corporate social relationship as responsibilityCorporate social relationship as responsibility
Corporate social relationship as responsibility
 
Teaching aptitude
Teaching aptitudeTeaching aptitude
Teaching aptitude
 
Trade union
Trade unionTrade union
Trade union
 
Preposition
PrepositionPreposition
Preposition
 
Tense
TenseTense
Tense
 
Verb
VerbVerb
Verb
 
Let Get Make
Let Get MakeLet Get Make
Let Get Make
 
Modals
ModalsModals
Modals
 
Direct & indirect speech
Direct & indirect speechDirect & indirect speech
Direct & indirect speech
 
Active & Passive Voice
Active & Passive VoiceActive & Passive Voice
Active & Passive Voice
 
Software development life cycle (SDLC)
Software development life cycle (SDLC)Software development life cycle (SDLC)
Software development life cycle (SDLC)
 
Business cycle
Business cycleBusiness cycle
Business cycle
 
Communication
CommunicationCommunication
Communication
 
Job analysis
Job analysisJob analysis
Job analysis
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Pricing Strategy
Pricing StrategyPricing Strategy
Pricing Strategy
 
Marketing research
Marketing researchMarketing research
Marketing research
 
Theories of entrepreneurship
Theories of entrepreneurshipTheories of entrepreneurship
Theories of entrepreneurship
 
Software testing
Software testingSoftware testing
Software testing
 
Tree
TreeTree
Tree
 

Último

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 

Último (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Computer network

  • 2. • A collection of computers (or computer like devices) that are able to communicate with each other through some medium, using hardware and software • Two computers (or computer like devices) are said to be connected, if they are able to exchange information or able to communicate
  • 3. • Simplex : Data transfer only in one direction. Example, radio broadcasting • Half duplex : Data transfer in both directions, but not simultaneously, i.e., in one direction at a time. Example, talk back radio, CB radio (citizen band) • Full duplex : Data transfer in both directions, simultaneously. Example, telephone
  • 4. • Data source : Provides the data to transmit • Sender/Transmitter : Converts data to signals for transmission • Data Transmission System : Transmits the data, i.e., converted in signals • Receiver : Converts received signals to data • Destination : Receives and uses incoming data • Node : A device with independent communication ability and unique network address • Protocol : A formal description, comprising rules and conventions defines the method of communication between networking devices
  • 5. • Unicast : One device sends message to the other to its address • Broadcast : One device sends message to all other devices on the network. The message is sent to an address reserved for this goal • Multicast : One device sends message to a certain group of devices on the network
  • 6. • There are three types of networks: 1. Local Area Network (LAN) 2. Metropolitan Area Network (MAN) 3. Wide Area Network (WAN)
  • 7. • LAN is privately owned network within a single building or campus • LANs can be small, linking as few as three computers, but often link hundreds of computers used by thousands of people (like in some IT office, etc)
  • 8. • A metropolitan area network (MAN) covers a city • An example of MAN is cable television network in city
  • 9. • A wide area network or WAN spans a large geographical area often a country
  • 10. • Internet is also known as network of networks • It is a system of linked networks that are world wide in scope and facilitate data communication services such as remote login, file transfer, electronic mail, world wide web and newsgroups, etc
  • 11. • Network topology is the arrangement of the various elements of a computer or biological network • It is the topological structure of a network, and may be depicted physically or logically • Physical topology refers to the placement of the network’s various components, inducing device location and cable installation • Logical topology shows how data flows within a network, regardless of its physical design
  • 12. • In bus topology, each node (computer server, other computer like devices) is directly connected to a common cable • At the first, the message will go through the bus then one user can communicate with other
  • 13. • In this topology, each node has a dedicated set of wires connecting it to a central network hub • First the message will go to the hub then that message will go to other user
  • 14. • A ring topology features a logically closed loop. • Data packets travel in a single direction around the ring from one network device to the next • Each network device acts as a repeater to keep the signal strong enough as it travels
  • 15. • In mesh topology, each system is connected to all other systems in the network • Any user can directly communicate with other users
  • 16. • In this type of network topology, in which a central root is connected to two or more nodes that are one level lower in hierarchy
  • 17. • Networking hardware may also be known as network equipment , computer networking devices • Some of the important networking devices include 1. Network Interface Card (NIC) 2. Repeater 3. Bridge 4. Switch 5. Routers 6. Gateway 7. Ethernet 8. Fibre Distributed Data Interface (FDDI)
  • 18. • NIC provides a physical connection between the networking cable and the computer’s internal bus • NICs comes in three basic varieties 8 bit, 16 bit and 32 bit • The larger the number of bits that can be transferred to NIC, the faster the NIC can transfer data to network cable
  • 19. • Repeaters are used to connect together two Ethernet segments of any media type. • They provide the signal amplification required to allow a segment (cable) to be extended a greater distance • A typical repeater has just 2 ports
  • 20. • Bridges map the addresses of the nodes residing on each network segment and allow only necessary traffic to pass through bridge • The function of the bridge is to connect separate networks together • Bridges do not forward bad or misaligned packets
  • 21. • Switches are an expansion of concept of bridging • LAN switches can link 4, 6, 10 or more networks together • Switches have 2 basic architectures : cut through and store-and-forward • It alleviates congestion in Ethernet LAN by reducing traffic and increasing bandwidth
  • 22. • Routers forward packets from one LAN (or WAN) network to another • It is used at the edges of the networks to connect to the Internet
  • 23. • Gateway acts like an entrance between two different networks. • It is the computer that routes the traffic from a workstation to the outside network that is serving web pages. • ISP (Internet Service Provider) is the gateway for Internet service at homes.
  • 24. • IEEE 802.2 : Logical Link Control (LLC) • IEEE 802.3 : Ethernet • IEEE 802.5 : Token Ring • IEEE 802.11 : Wireless LAN • IEEE 802.15 : Bluetooth • IEEE 802.16 : Wireless MAN
  • 25. • IEEE Standard 802.3 defines Ethernet, rules for configuring Ethernet network as well as specify how elements in an Ethernet network interact with each other • It uses Carrier Sense Multiple Access/Collision Detect (CSMA/CD) technology broadcasting each from onto the physical medium (wire fibre and so on) • All stations attached to Ethernet listen to the line for traffic and the station with the matching destination MAC address accepts the frame
  • 26. • Token Ring is a form of network configuration in which all messages are transferred in an unidirectional manner along the ring at all the times • Medium Access Control (MAC) is provided by a small frame, the token that circulates around the ring when all stations are idle. Only the station (node) possessing the token is allowed to transmit at any given time • It can connect upto 255 nodes in a physical star or ring connection that can sustain 4 or 16 Mbps
  • 27. • FDDI is a form of network configuration, uses ring topology of multimedia or single mode optical fibre transmission links • It operates at 100 Mbps to span upto 200km and permits upto 500 stations • It employs dual counter rotating rings • 16 and 48 bit addresses are allowed • Token is absorbed by station and released as soon as it completes the frame transmission