SlideShare uma empresa Scribd logo
1 de 43
Networks
Networks
A network is a collection of computers and
devices connected together via communication
devices and transmission media.
LAN
A local area network (LAN) is a network that
connects computers and devices in a limited
geographical area such as a home, school
computer laboratory, office building or closely
positioned group of buildings.
Advantages
Advantages
• Speed
Sharing within networks is very rapid and can save time.
• Cost
Site-licensed (shared) versions are available at considerable savings.
Programs stored on a network’s server allow for easy upgrading.
• Security
Sensitive files and programs on a network are easily password-protected.
• Peripheral equipment sharing
Resources such as printers, modems can be shared.
• Electronic mail
• Centralised software management
Greatly reduces the need to spend time and energy installing updates and
tracking files on independent computers throughout the building.
• Workgroup computing
Workgroup software allows many users to work on a document or project
concurrently
Disadvantages of networking
Disadvantages of networking
• The cabling, network cards, file servers, etc that are
required to set up a network are expensive.
• If a server fails the entire network may stop operating.
• Viruses can spread from one computer to another over
a network.
• Decisions on resource planning tend to become
centralised.
• Networks that have grown with little thought or
appropriate planning can be inefficient in the long
term.
• As traffic increases on a network, performance declines
unless it is properly designed.
Network Architectures
Client/Server
Client/Server
On a client/server network,
one or more computers act
as a server, and the other
computers on the network
request services from the
server. The other computers
and mobile devices on the
network are referred to as
clients.
Peer-to-Peer
Peer-to-Peer
Peer-to peer network is a simple inexpensive
network that typically connects fewer than 10
computers. Each computer called a peer, has
equal responsibilities and capabilities, sharing
hardware (such as a printer), data etc.
Network Topologies
A network topology refers to the layout of the
computers and devices in a communications
network. Three commonly used network
topologies are bus, ring and star. Networks
usually use combinations of bus and star
topologies.
Bus Network
Bus Network
A bus network consists of a single central cable, to which all
computers and other devices (nodes) connect. The bus is the
physical cable that connects the computers and other devices.
It transmits data, instructions, and information in both
directions. When a sending device transmits data, the address
of the receiving device is included with the transmission so
the data is routed to the appropriate receiving device.
Bus Network
Bus networks are popular on LANs because they are
inexpensive and easy to install. Computers and other
devices can be attached and detached at any point on the
bus without disturbing the rest of the network. The main
disadvantage is the limit in size of the bus.
Star Network
Star Network
On a star network, all of the computers and
devices (nodes) on the network connect to a
central device, thus forming a star. Two types of
device that provide a common central
connection point on the network are a hub and
a switch.
Star Network
• Star networks are fairly easy to install and
maintain. Nodes can be added and removed
from the network no disruption to the
network.
Star Network
If one node fails, only that node is affected. If
the hub/switch fails the entire network is
inoperable. Most star networks consist of
multiple switches though and in that case only
the part of the network connected to that
switch will fail
Network Communication Standards
A network standard defines
guidelines that specify the way
computers access a network,
the types of medium used, the
speeds used and the type/s of
physical cable and/or wireless
technology used. A standard
that outlines how two network
devices communicate is called a
protocol.
Ethernet
Ethernet
• Ethernet is the most popular network
standard for LANs because it is relatively
inexpensive and easy to install and maintain.
• Ethernet is based on the bus topology, but
Ethernet networks can wired in a star pattern.
Ethernet 802.3
• The Ethernet (IEEE 802.3) standard for Local Area Networks (LANs). The
802.3 standard (also called Twisted Pair Ethernet) uses a twisted-pair cable
for distances up to 100m.
• 10Base-T - operates at 10 Mbps - uses a twisted-pair cable with maximum
lengths of 100 meters.
• 100Base-T – operates at 100 Mbps – often referred to as fast internet –
can use – two or four paris of twisted wires or fibre optic cables.
• 1000Base-T – operates 1Gb/s – CAT-5 cabling
• 10GbE – operates 10Gb/s – copper (CAT6a or better) or fibre cabling
WiFi
WiFi
A wireless network uses radio waves, just like cell phones, televisions
and radios do. In fact, communication across a wireless network is a lot
like two-way radio communication. Here's what happens:
1. A computer's wireless adapter translates data into a radio signal
and transmits it using an antenna.
2. A wireless router receives the signal and decodes it. The router
sends the information to the Internet using a physical, wired
Ethernet connection.
802.11
• IEEE 802.11 is a set of standards for implementing wireless local
area network (WLAN) computer.
Building a Wireless Network
1. A port to connect to your cable or DSL
modem
2. A router
3. An Ethernet hub
4. A firewall
5. A wireless access point
Bluetooth
Bluetooth
Bluetooth takes small-area networking to the
next level by removing the need for user
intervention and keeping transmission power
extremely low to save battery power.
The big draws of Bluetooth are that it is wireless,
inexpensive and automatic.
Wireless Security
WiFi Protected Access (WPA) is
now part of the 802.11i wireless
network security protocol. It uses
encryption and involves signing on
with a password. Most public
hotspots are either open or use
WPA or 128-bit WEP technology
(Wired Equivalency Privacy – an
older form of security)
Wireless Application Protocol
• Wireless Application
Protocol (WAP) is a
technical standard for
accessing information
over a mobile (phone)
wireless network. A
WAP browser is a web
browser for mobile
devices such as mobile
phones that uses the
protocol.
TCP/IP
TCP/IP
Transmission Control Protocol/Internet Protocol, TCP/IP is
a network standard, that defines how data is routed from
one end of a network to the other end, ensuring the data
arrives correctly. It describes rules for;
• dividing data into small pieces, called packets
• providing addresses for each packet,
• checking for and detection of errors,
• sequencing packets and,
• regulating the flow of messages along the network
TCP/IP has been adopted as a network standard for
Internet communications.
Short for HyperText Transfer Protocol, HTTP is
the underlying protocol used by the World Wide
Web. HTTP defines how messages are formatted
and transmitted, and what actions Web servers
and browsers should take in response to various
commands.
HTTPS is a communications protocol for secure
communication over a computer network, with especially
wide deployment on the Internet.
Historically, HTTPS connections were primarily used for
payment transactions on the World Wide Web, e-mail
and for sensitive transactions in corporate information
systems. In the late 2000s and early 2010s, HTTPS began
to see widespread use for protecting page authenticity on
all types of websites, securing accounts and keeping user
communications, identity and web browsing private.
Routers, Packets, Switches, Hubs, and
Firewalls
Routers
When you send e-mail to a friend on the other side of the
country, how does the message know to end up on your
friend's computer, rather than on one of the millions of other
computers in the world? Much of the work to get a message
from one computer to another is done by routers, because
they're the crucial devices that let messages flow between
networks, rather than within networks.
Packets
Internet data, whether in the form of a
Web page, a downloaded file or an e-mail
message, travels over a system known as a
packet-switching network. In this system,
the data in a message or file is broken up
into packets about 1,500 bytes long. Each
of these packets includes information on
the sender's address, the receiver's
address, the packet’s place in the entire
message, and how the receiving computer
can be sure that the packet arrived intact.
NIC
• Network Interface Card (NIC), an expansion
board you insert into a computer so the
computer can be connected to a network.
• These days this functionality is already built
into the motherboard and so a NIC is not
needed.
Modem
• Short for MOdulator-DEModulator. A modem is
a device or program that enables a computer to
connect to the internet or simply transmit data
over, for example, telephone or cable lines. Ye
olden modems converted from analogue to
digital and back again but modern modems do
not need to do this anymore.
Switch
• Switches allow different nodes (a
network connection point, typically
a computer) of a network to
communicate directly with one
another in a smooth and efficient
manner.
• Essentially, a LAN switch creates a
series of instant networks that
contain only the two devices
communicating with each other at
that particular moment.
Firewall
• A firewall is simply a program or hardware
device that filters the information coming
through the Internet connection into your
private network or computer system.
More Hardware Stuff
• DSL Modem
• Hotspt (Wifi)
• Network Interface Card
• Ethernet Cabling
• Fibre Optic Cable

Mais conteúdo relacionado

Mais procurados

PPT ON COMPUTER NETWORK AND IT'S TYPES.
PPT ON COMPUTER NETWORK AND IT'S TYPES.PPT ON COMPUTER NETWORK AND IT'S TYPES.
PPT ON COMPUTER NETWORK AND IT'S TYPES.satyamjipatel
 
Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic conceptsrahul kapoliya
 
Lan, man and wan ppt final
Lan, man and wan ppt finalLan, man and wan ppt final
Lan, man and wan ppt finalArushi Garg
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networksHaider Ali Malik
 
Computer network ppt communication
Computer network ppt communicationComputer network ppt communication
Computer network ppt communicationKajal Sharma
 
Hub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeaterHub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeaterMaksudujjaman
 
Types of computer networks
Types of computer networksTypes of computer networks
Types of computer networksTatheer Fatima
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingMayank Jain
 
CCNA Course Training Presentation
CCNA Course Training PresentationCCNA Course Training Presentation
CCNA Course Training PresentationRohit Singh
 
Introduction to network
Introduction to networkIntroduction to network
Introduction to networkDhani Ahmad
 
Computer networking ppt
Computer networking pptComputer networking ppt
Computer networking pptJitender Kumar
 
Networking concepts
Networking conceptsNetworking concepts
Networking conceptsseemadav1
 
Routers.ppt
Routers.pptRouters.ppt
Routers.pptkirbadh
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardwareMziaulla
 
Network Interface Card
Network Interface CardNetwork Interface Card
Network Interface Cardsourabh4u07
 
Introduction of computer network
Introduction of computer networkIntroduction of computer network
Introduction of computer networkVivek Kumar Sinha
 

Mais procurados (20)

PPT ON COMPUTER NETWORK AND IT'S TYPES.
PPT ON COMPUTER NETWORK AND IT'S TYPES.PPT ON COMPUTER NETWORK AND IT'S TYPES.
PPT ON COMPUTER NETWORK AND IT'S TYPES.
 
Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic concepts
 
Lan, man and wan ppt final
Lan, man and wan ppt finalLan, man and wan ppt final
Lan, man and wan ppt final
 
Wide area network (wan)
Wide area network (wan)Wide area network (wan)
Wide area network (wan)
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
 
Computer network ppt communication
Computer network ppt communicationComputer network ppt communication
Computer network ppt communication
 
Hub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeaterHub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeater
 
Types of computer networks
Types of computer networksTypes of computer networks
Types of computer networks
 
Networking
NetworkingNetworking
Networking
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
CCNA Course Training Presentation
CCNA Course Training PresentationCCNA Course Training Presentation
CCNA Course Training Presentation
 
Computer network
Computer networkComputer network
Computer network
 
Introduction to network
Introduction to networkIntroduction to network
Introduction to network
 
Computer networking ppt
Computer networking pptComputer networking ppt
Computer networking ppt
 
Wide Area Network (WAN)
Wide Area Network (WAN)Wide Area Network (WAN)
Wide Area Network (WAN)
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
Routers.ppt
Routers.pptRouters.ppt
Routers.ppt
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 
Network Interface Card
Network Interface CardNetwork Interface Card
Network Interface Card
 
Introduction of computer network
Introduction of computer networkIntroduction of computer network
Introduction of computer network
 

Destaque

Sm1 Computer Networks
Sm1 Computer NetworksSm1 Computer Networks
Sm1 Computer NetworksMiriam Tello
 
Computer Networks for Computer Science Student
Computer Networks for Computer Science StudentComputer Networks for Computer Science Student
Computer Networks for Computer Science Studentrprajat007
 
History of Video Games up to 90s
History of Video Games up to 90sHistory of Video Games up to 90s
History of Video Games up to 90sMark Rotondella
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networkssanjeev kumar
 
Unit 1 introduction to computer networks
Unit 1  introduction to computer networksUnit 1  introduction to computer networks
Unit 1 introduction to computer networkspavan kumar Thatikonda
 
Chapter 4 computer networks
Chapter 4   computer networksChapter 4   computer networks
Chapter 4 computer networksPratik Gupta
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And ProtocolsSteven Cahill
 
Types of Network Architecture
Types of Network ArchitectureTypes of Network Architecture
Types of Network Architecturesabari Giri
 
Introduction to Computer Networks
 Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer NetworksGhaffar Khan
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer NetworkingHj Habib
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS Kak Yong
 

Destaque (13)

Sm1 Computer Networks
Sm1 Computer NetworksSm1 Computer Networks
Sm1 Computer Networks
 
Computer Networks for Computer Science Student
Computer Networks for Computer Science StudentComputer Networks for Computer Science Student
Computer Networks for Computer Science Student
 
History of Video Games up to 90s
History of Video Games up to 90sHistory of Video Games up to 90s
History of Video Games up to 90s
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
 
1. computer networks u1 ver 1.0
1. computer networks u1 ver 1.01. computer networks u1 ver 1.0
1. computer networks u1 ver 1.0
 
Computer networks
Computer networksComputer networks
Computer networks
 
Unit 1 introduction to computer networks
Unit 1  introduction to computer networksUnit 1  introduction to computer networks
Unit 1 introduction to computer networks
 
Chapter 4 computer networks
Chapter 4   computer networksChapter 4   computer networks
Chapter 4 computer networks
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
 
Types of Network Architecture
Types of Network ArchitectureTypes of Network Architecture
Types of Network Architecture
 
Introduction to Computer Networks
 Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer Networks
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer Networking
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
 

Semelhante a Computer Networks

Network ppt
Network pptNetwork ppt
Network ppthlalu861
 
Install network cable module CSS NC2
Install network cable module CSS NC2Install network cable module CSS NC2
Install network cable module CSS NC2wilfredo dela cerna
 
Network plus study guide N10-005
Network plus study guide N10-005 Network plus study guide N10-005
Network plus study guide N10-005 ramloganricki
 
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSENETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSETENZING LHADON
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And TelecommunicationsUMaine
 
Grade 11 CSS Lesson 3 Computer Network.pptx
Grade 11 CSS Lesson 3 Computer Network.pptxGrade 11 CSS Lesson 3 Computer Network.pptx
Grade 11 CSS Lesson 3 Computer Network.pptxCatherineBotardo3
 
Class Note
Class NoteClass Note
Class NoteAK IJ
 
Network Security and its applications in
Network Security and its applications inNetwork Security and its applications in
Network Security and its applications inssuser6478a8
 
Computer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsComputer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsSubas Paudel
 
Data Communication and Computer Network Overview
Data Communication and Computer Network Overview Data Communication and Computer Network Overview
Data Communication and Computer Network Overview RANVIJAY GAUR
 
Communications and Networking
Communications and NetworkingCommunications and Networking
Communications and NetworkingSajitha Pathirana
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12LakshyaT
 
2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.pptjaba kumar
 
Computer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.pptComputer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.pptmv9499596
 

Semelhante a Computer Networks (20)

Fg c
Fg cFg c
Fg c
 
Network ppt
Network pptNetwork ppt
Network ppt
 
COMPUTER NETWORKS
COMPUTER NETWORKSCOMPUTER NETWORKS
COMPUTER NETWORKS
 
Networkingconcepts
NetworkingconceptsNetworkingconcepts
Networkingconcepts
 
final NEtworking.pptx
final  NEtworking.pptxfinal  NEtworking.pptx
final NEtworking.pptx
 
Install network cable module CSS NC2
Install network cable module CSS NC2Install network cable module CSS NC2
Install network cable module CSS NC2
 
Network plus study guide N10-005
Network plus study guide N10-005 Network plus study guide N10-005
Network plus study guide N10-005
 
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSENETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
 
Grade 11 CSS Lesson 3 Computer Network.pptx
Grade 11 CSS Lesson 3 Computer Network.pptxGrade 11 CSS Lesson 3 Computer Network.pptx
Grade 11 CSS Lesson 3 Computer Network.pptx
 
Class Note
Class NoteClass Note
Class Note
 
Network Security and its applications in
Network Security and its applications inNetwork Security and its applications in
Network Security and its applications in
 
Computer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsComputer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber Ethics
 
Data Communication and Computer Network Overview
Data Communication and Computer Network Overview Data Communication and Computer Network Overview
Data Communication and Computer Network Overview
 
Networks
NetworksNetworks
Networks
 
Communications and Networking
Communications and NetworkingCommunications and Networking
Communications and Networking
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12
 
Cct203 lesson 10
Cct203 lesson 10Cct203 lesson 10
Cct203 lesson 10
 
2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt
 
Computer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.pptComputer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.ppt
 

Mais de Mark Rotondella

History of Computer Animation
History of Computer AnimationHistory of Computer Animation
History of Computer AnimationMark Rotondella
 
Computer Hardware Basics
Computer Hardware BasicsComputer Hardware Basics
Computer Hardware BasicsMark Rotondella
 
History of Video Games 90s till 00
History of Video Games 90s till 00History of Video Games 90s till 00
History of Video Games 90s till 00Mark Rotondella
 
Design Principles and Elements
Design Principles and ElementsDesign Principles and Elements
Design Principles and ElementsMark Rotondella
 
Sustainability in Design
Sustainability in DesignSustainability in Design
Sustainability in DesignMark Rotondella
 
Goldern Ratio and the Rule of Thirds
Goldern Ratio and the Rule of ThirdsGoldern Ratio and the Rule of Thirds
Goldern Ratio and the Rule of ThirdsMark Rotondella
 
Occupational Health and Safety (Australia)
Occupational Health and Safety (Australia)Occupational Health and Safety (Australia)
Occupational Health and Safety (Australia)Mark Rotondella
 
Shannon and Weaver Communication Model
Shannon and Weaver Communication ModelShannon and Weaver Communication Model
Shannon and Weaver Communication ModelMark Rotondella
 

Mais de Mark Rotondella (16)

History of Video Games
History of Video GamesHistory of Video Games
History of Video Games
 
Great People in IT
Great People in ITGreat People in IT
Great People in IT
 
History of Computer Animation
History of Computer AnimationHistory of Computer Animation
History of Computer Animation
 
3rd Form Normalisation
3rd Form Normalisation3rd Form Normalisation
3rd Form Normalisation
 
Google Search Tips
Google Search TipsGoogle Search Tips
Google Search Tips
 
Computer Hardware Basics
Computer Hardware BasicsComputer Hardware Basics
Computer Hardware Basics
 
Great People in IT
Great People in ITGreat People in IT
Great People in IT
 
File Formats
File FormatsFile Formats
File Formats
 
Data management
Data managementData management
Data management
 
History of Video Games 90s till 00
History of Video Games 90s till 00History of Video Games 90s till 00
History of Video Games 90s till 00
 
Design Principles and Elements
Design Principles and ElementsDesign Principles and Elements
Design Principles and Elements
 
Sustainability in Design
Sustainability in DesignSustainability in Design
Sustainability in Design
 
Goldern Ratio and the Rule of Thirds
Goldern Ratio and the Rule of ThirdsGoldern Ratio and the Rule of Thirds
Goldern Ratio and the Rule of Thirds
 
Occupational Health and Safety (Australia)
Occupational Health and Safety (Australia)Occupational Health and Safety (Australia)
Occupational Health and Safety (Australia)
 
Shannon and Weaver Communication Model
Shannon and Weaver Communication ModelShannon and Weaver Communication Model
Shannon and Weaver Communication Model
 
Key Movements in Design
Key Movements in DesignKey Movements in Design
Key Movements in Design
 

Último

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 

Último (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Computer Networks

  • 2. Networks A network is a collection of computers and devices connected together via communication devices and transmission media.
  • 3. LAN A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school computer laboratory, office building or closely positioned group of buildings.
  • 5. Advantages • Speed Sharing within networks is very rapid and can save time. • Cost Site-licensed (shared) versions are available at considerable savings. Programs stored on a network’s server allow for easy upgrading. • Security Sensitive files and programs on a network are easily password-protected. • Peripheral equipment sharing Resources such as printers, modems can be shared. • Electronic mail • Centralised software management Greatly reduces the need to spend time and energy installing updates and tracking files on independent computers throughout the building. • Workgroup computing Workgroup software allows many users to work on a document or project concurrently
  • 7. Disadvantages of networking • The cabling, network cards, file servers, etc that are required to set up a network are expensive. • If a server fails the entire network may stop operating. • Viruses can spread from one computer to another over a network. • Decisions on resource planning tend to become centralised. • Networks that have grown with little thought or appropriate planning can be inefficient in the long term. • As traffic increases on a network, performance declines unless it is properly designed.
  • 10. Client/Server On a client/server network, one or more computers act as a server, and the other computers on the network request services from the server. The other computers and mobile devices on the network are referred to as clients.
  • 12. Peer-to-Peer Peer-to peer network is a simple inexpensive network that typically connects fewer than 10 computers. Each computer called a peer, has equal responsibilities and capabilities, sharing hardware (such as a printer), data etc.
  • 13. Network Topologies A network topology refers to the layout of the computers and devices in a communications network. Three commonly used network topologies are bus, ring and star. Networks usually use combinations of bus and star topologies.
  • 15. Bus Network A bus network consists of a single central cable, to which all computers and other devices (nodes) connect. The bus is the physical cable that connects the computers and other devices. It transmits data, instructions, and information in both directions. When a sending device transmits data, the address of the receiving device is included with the transmission so the data is routed to the appropriate receiving device.
  • 16. Bus Network Bus networks are popular on LANs because they are inexpensive and easy to install. Computers and other devices can be attached and detached at any point on the bus without disturbing the rest of the network. The main disadvantage is the limit in size of the bus.
  • 18. Star Network On a star network, all of the computers and devices (nodes) on the network connect to a central device, thus forming a star. Two types of device that provide a common central connection point on the network are a hub and a switch.
  • 19. Star Network • Star networks are fairly easy to install and maintain. Nodes can be added and removed from the network no disruption to the network.
  • 20. Star Network If one node fails, only that node is affected. If the hub/switch fails the entire network is inoperable. Most star networks consist of multiple switches though and in that case only the part of the network connected to that switch will fail
  • 21. Network Communication Standards A network standard defines guidelines that specify the way computers access a network, the types of medium used, the speeds used and the type/s of physical cable and/or wireless technology used. A standard that outlines how two network devices communicate is called a protocol.
  • 23. Ethernet • Ethernet is the most popular network standard for LANs because it is relatively inexpensive and easy to install and maintain. • Ethernet is based on the bus topology, but Ethernet networks can wired in a star pattern.
  • 24. Ethernet 802.3 • The Ethernet (IEEE 802.3) standard for Local Area Networks (LANs). The 802.3 standard (also called Twisted Pair Ethernet) uses a twisted-pair cable for distances up to 100m. • 10Base-T - operates at 10 Mbps - uses a twisted-pair cable with maximum lengths of 100 meters. • 100Base-T – operates at 100 Mbps – often referred to as fast internet – can use – two or four paris of twisted wires or fibre optic cables. • 1000Base-T – operates 1Gb/s – CAT-5 cabling • 10GbE – operates 10Gb/s – copper (CAT6a or better) or fibre cabling
  • 25. WiFi
  • 26. WiFi A wireless network uses radio waves, just like cell phones, televisions and radios do. In fact, communication across a wireless network is a lot like two-way radio communication. Here's what happens: 1. A computer's wireless adapter translates data into a radio signal and transmits it using an antenna. 2. A wireless router receives the signal and decodes it. The router sends the information to the Internet using a physical, wired Ethernet connection. 802.11 • IEEE 802.11 is a set of standards for implementing wireless local area network (WLAN) computer.
  • 27. Building a Wireless Network 1. A port to connect to your cable or DSL modem 2. A router 3. An Ethernet hub 4. A firewall 5. A wireless access point
  • 29. Bluetooth Bluetooth takes small-area networking to the next level by removing the need for user intervention and keeping transmission power extremely low to save battery power. The big draws of Bluetooth are that it is wireless, inexpensive and automatic.
  • 30. Wireless Security WiFi Protected Access (WPA) is now part of the 802.11i wireless network security protocol. It uses encryption and involves signing on with a password. Most public hotspots are either open or use WPA or 128-bit WEP technology (Wired Equivalency Privacy – an older form of security)
  • 31. Wireless Application Protocol • Wireless Application Protocol (WAP) is a technical standard for accessing information over a mobile (phone) wireless network. A WAP browser is a web browser for mobile devices such as mobile phones that uses the protocol.
  • 33. TCP/IP Transmission Control Protocol/Internet Protocol, TCP/IP is a network standard, that defines how data is routed from one end of a network to the other end, ensuring the data arrives correctly. It describes rules for; • dividing data into small pieces, called packets • providing addresses for each packet, • checking for and detection of errors, • sequencing packets and, • regulating the flow of messages along the network TCP/IP has been adopted as a network standard for Internet communications.
  • 34. Short for HyperText Transfer Protocol, HTTP is the underlying protocol used by the World Wide Web. HTTP defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands.
  • 35. HTTPS is a communications protocol for secure communication over a computer network, with especially wide deployment on the Internet. Historically, HTTPS connections were primarily used for payment transactions on the World Wide Web, e-mail and for sensitive transactions in corporate information systems. In the late 2000s and early 2010s, HTTPS began to see widespread use for protecting page authenticity on all types of websites, securing accounts and keeping user communications, identity and web browsing private.
  • 36. Routers, Packets, Switches, Hubs, and Firewalls
  • 37. Routers When you send e-mail to a friend on the other side of the country, how does the message know to end up on your friend's computer, rather than on one of the millions of other computers in the world? Much of the work to get a message from one computer to another is done by routers, because they're the crucial devices that let messages flow between networks, rather than within networks.
  • 38. Packets Internet data, whether in the form of a Web page, a downloaded file or an e-mail message, travels over a system known as a packet-switching network. In this system, the data in a message or file is broken up into packets about 1,500 bytes long. Each of these packets includes information on the sender's address, the receiver's address, the packet’s place in the entire message, and how the receiving computer can be sure that the packet arrived intact.
  • 39. NIC • Network Interface Card (NIC), an expansion board you insert into a computer so the computer can be connected to a network. • These days this functionality is already built into the motherboard and so a NIC is not needed.
  • 40. Modem • Short for MOdulator-DEModulator. A modem is a device or program that enables a computer to connect to the internet or simply transmit data over, for example, telephone or cable lines. Ye olden modems converted from analogue to digital and back again but modern modems do not need to do this anymore.
  • 41. Switch • Switches allow different nodes (a network connection point, typically a computer) of a network to communicate directly with one another in a smooth and efficient manner. • Essentially, a LAN switch creates a series of instant networks that contain only the two devices communicating with each other at that particular moment.
  • 42. Firewall • A firewall is simply a program or hardware device that filters the information coming through the Internet connection into your private network or computer system.
  • 43. More Hardware Stuff • DSL Modem • Hotspt (Wifi) • Network Interface Card • Ethernet Cabling • Fibre Optic Cable