SlideShare a Scribd company logo
1 of 10
Download to read offline
KINDS OF NETWORK’S
SMT. TULSIBAI RANGALALJI ZAMBAD, NANDURA
DEPARTMENT OF COMMERCE
B.COM-II (SEM-IV)
SUMMER 2022-23
SUBJECT :- INFORMATION TECHNOLOGY AND BUSINESS
DATA PROCESSING-II
PRESCRIBED BY :- KALYANI KOLHE MAM
PRESENTED BY :- MANDAR VINOD GHATE
CONTAIN :-
• INTROUCATION OF NETWORK
• TYPES OF NETWORK’s
INTRODUCATION OF NETWORK
A network is simply a group of two or more Personal Computers linked together.
Many types of networks exist, but the most common types of networks are Local-Area
Networks (LANs), and Wide-Area Networks (WANs).
In a LAN, computers are connected together within a "local" area (for example,
an office or home). In a WAN, computers are further apart and are connected via
telephone/communication lines, radio waves or other means of connection.
TYPES OF NEWTORK
A computer network can be categorized by their size. A computer network is mainly of four
types:
Computer Network Types :-
LAN (Local Area Network)
PAN (Personal Area Network)
MAN (Metropolitan Area Network)
WAN (Wide Area Network)
❑ LAN(Local Area Network)
Local Area Network is a group of computers connected to each other in a small area such as
building, office.
LAN is used for connecting two or more personal computers through a communication medium
such as twisted pair, coaxial cable, etc.
It is less costly as it is built with inexpensive hardware such as hubs, network adapters, and
ethernet cables.
The data is transferred at an extremely faster rate in Local Area Network.
Local Area Network provides higher security.
❑ PAN(Personal Area Network)
Personal Area Network is a network arranged within an individual person, typically within a
range of 10 meters. Personal Area Network is used for connecting the computer devices of
personal use is known as Personal Area Network. Thomas Zimmerman was the first research
scientist to bring the idea of the Personal Area Network. This Area Network covers an area of 30
feet. Personal computer devices that are used to develop the personal area network are the laptop,
mobile phones, media player and play stations.
There are two types of Personal Area Network :
Computer Network Types :-
i. Wired Personal Area Network
ii. Wireless Personal Area Network
❑ MAN(Metropolitan Area Network)
A metropolitan area network is a network that covers a larger geographic area by interconnecting
a different LAN to form a larger network.
Government agencies use MAN to connect to the citizens and private industries.
In MAN, various LANs are connected to each other through a telephone exchange line.
The most widely used protocols in MAN are RS-232, Frame Relay, ATM, ISDN, OC-3, ADSL,
etc.
It has a higher range than Local Area Network(LAN).
❑ WAN(Wide Area Network)
A Wide Area Network is a network that extends over a large geographical area such as states or
countries. Wide Area Network is quite bigger network than the LAN. This Area Network is not
limited to a single location, but it spans over a large geographical area through a telephone line,
fibre optic cable or satellite links. The internet is one of the biggest WAN in the world.
A Wide Area Network is widely used in the field of Business, government, and education
❑ Reference :-
1. https://www.firewall.cx/networking-topics/general-networking/102-
introduction-networking.html
2. https://www.javatpoint.com/types-of-computer-network
Thank You

More Related Content

Similar to ITBDP ppt MG.pdf

Similar to ITBDP ppt MG.pdf (20)

Computer Network Types.pptx
Computer Network Types.pptxComputer Network Types.pptx
Computer Network Types.pptx
 
Note 2
Note 2Note 2
Note 2
 
Classification of computer networks
Classification of computer networksClassification of computer networks
Classification of computer networks
 
COMPUTER NETWORKs.pptx
COMPUTER NETWORKs.pptxCOMPUTER NETWORKs.pptx
COMPUTER NETWORKs.pptx
 
Types of network
Types of networkTypes of network
Types of network
 
Types of Computer Network
Types of Computer NetworkTypes of Computer Network
Types of Computer Network
 
Classification of computer networks
Classification of computer networksClassification of computer networks
Classification of computer networks
 
Definition of computur netwoeks
Definition of computur netwoeksDefinition of computur netwoeks
Definition of computur netwoeks
 
Classification of computer network
Classification of computer networkClassification of computer network
Classification of computer network
 
Classification of Computer Network
Classification of Computer NetworkClassification of Computer Network
Classification of Computer Network
 
unit 1PPT.pptx
unit 1PPT.pptxunit 1PPT.pptx
unit 1PPT.pptx
 
Computer network
Computer networkComputer network
Computer network
 
Assignment 1
Assignment 1Assignment 1
Assignment 1
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
PPT Introduction to types of networks
PPT Introduction to types of networksPPT Introduction to types of networks
PPT Introduction to types of networks
 
Networks.pptx
Networks.pptxNetworks.pptx
Networks.pptx
 
Dipanshu
DipanshuDipanshu
Dipanshu
 
Computer Network Types.pptx
Computer Network Types.pptxComputer Network Types.pptx
Computer Network Types.pptx
 
Computer networking ppt
Computer networking pptComputer networking ppt
Computer networking ppt
 
Network Types
Network TypesNetwork Types
Network Types
 

Recently uploaded

Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfAnubhavMangla3
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 

Recently uploaded (20)

Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 

ITBDP ppt MG.pdf

  • 2. SMT. TULSIBAI RANGALALJI ZAMBAD, NANDURA DEPARTMENT OF COMMERCE B.COM-II (SEM-IV) SUMMER 2022-23 SUBJECT :- INFORMATION TECHNOLOGY AND BUSINESS DATA PROCESSING-II PRESCRIBED BY :- KALYANI KOLHE MAM PRESENTED BY :- MANDAR VINOD GHATE
  • 3. CONTAIN :- • INTROUCATION OF NETWORK • TYPES OF NETWORK’s
  • 4. INTRODUCATION OF NETWORK A network is simply a group of two or more Personal Computers linked together. Many types of networks exist, but the most common types of networks are Local-Area Networks (LANs), and Wide-Area Networks (WANs). In a LAN, computers are connected together within a "local" area (for example, an office or home). In a WAN, computers are further apart and are connected via telephone/communication lines, radio waves or other means of connection.
  • 5. TYPES OF NEWTORK A computer network can be categorized by their size. A computer network is mainly of four types: Computer Network Types :- LAN (Local Area Network) PAN (Personal Area Network) MAN (Metropolitan Area Network) WAN (Wide Area Network)
  • 6. ❑ LAN(Local Area Network) Local Area Network is a group of computers connected to each other in a small area such as building, office. LAN is used for connecting two or more personal computers through a communication medium such as twisted pair, coaxial cable, etc. It is less costly as it is built with inexpensive hardware such as hubs, network adapters, and ethernet cables. The data is transferred at an extremely faster rate in Local Area Network. Local Area Network provides higher security.
  • 7. ❑ PAN(Personal Area Network) Personal Area Network is a network arranged within an individual person, typically within a range of 10 meters. Personal Area Network is used for connecting the computer devices of personal use is known as Personal Area Network. Thomas Zimmerman was the first research scientist to bring the idea of the Personal Area Network. This Area Network covers an area of 30 feet. Personal computer devices that are used to develop the personal area network are the laptop, mobile phones, media player and play stations. There are two types of Personal Area Network : Computer Network Types :- i. Wired Personal Area Network ii. Wireless Personal Area Network
  • 8. ❑ MAN(Metropolitan Area Network) A metropolitan area network is a network that covers a larger geographic area by interconnecting a different LAN to form a larger network. Government agencies use MAN to connect to the citizens and private industries. In MAN, various LANs are connected to each other through a telephone exchange line. The most widely used protocols in MAN are RS-232, Frame Relay, ATM, ISDN, OC-3, ADSL, etc. It has a higher range than Local Area Network(LAN).
  • 9. ❑ WAN(Wide Area Network) A Wide Area Network is a network that extends over a large geographical area such as states or countries. Wide Area Network is quite bigger network than the LAN. This Area Network is not limited to a single location, but it spans over a large geographical area through a telephone line, fibre optic cable or satellite links. The internet is one of the biggest WAN in the world. A Wide Area Network is widely used in the field of Business, government, and education ❑ Reference :- 1. https://www.firewall.cx/networking-topics/general-networking/102- introduction-networking.html 2. https://www.javatpoint.com/types-of-computer-network