SlideShare a Scribd company logo
1 of 28
Download to read offline
COMPUTER NETWORKS
MS. M. FLORENCE DAYANA
ASST. PROFESSOR IN BCA,
BON SECOURS COLLEGE FOR
WOMEN,THANJAVUR
1
COMPUTER NETWORKS
 A computer network is an interconnection of various
computer systems located at different places
 Two or more computers are linked together with a
medium and data communication devices for the
purpose of communicating data and sharing resources
 The computer that provides resources to other computers
on a network is known as server.
 Individual computers in the network, which access shared
network resources, are known as nodes.
2
Local Area Network (LAN)
 Networks used to interconnect computers in a single room,
rooms within a building or buildings on one site are called
Local Area Network (LAN).
 LAN transmits data with a speed of several megabits per
second
 The transmission medium is normally coaxial cables.
 LAN links computers, in the same area for the purpose of
sharing information.
 Usually LAN links computers within a limited geographical area
because they must be connected by a cable, which is quite
expensive.
 People working in LAN get more capabilities in data
processing, work processing and other information exchange
compared to stand-alone computers.
3
Characteristics of LAN
1) every computer has the potential to
communicate with any other computers of the
network
2) high degree of connection between computers
3) easy physical connection of computers in a
network
4) inexpensive medium of data transmission
5) high data transmission rate
4
Use of LAN
1) File transfers and Access
2) Word and text processing
3) Electronic message handling
4) Remote database access
5) Personal computing
6) Digital voice transmission and storage
5
Wide Area Network
 The termWide Area Network (WAN) is
used to describe a computer network
spanning a regional, national or global area.
 For example, for a large company the head
quarters might be at Cairo and regional
branches at Mansoura,Tanta , and Aswan.
 the transmission medium used are normally
telephone lines, microwaves and satellite
links
6
The characteristics of WAN
 Communication Facility: For a big
company spanning over the country the
employees can save long distance phone
calls and it overcomes the time lag in
overseas communications.
 Computer conferencing is another use
ofWAN where users communicate with
each other through their computer
system.
7
 Remote Data Entry is possible in WAN. It
means sitting at any location you can enter
data, update data and query other
information of any computer attached to the
WAN
 Centralized Information: This means if
the organization is spread over many cities,
they keep their important business data in a
single place.WAN permits collection of this
data from different sites and save at a single
site
8
Difference between LAN and WAN
 LAN is restricted to limited geographical area of few kilometers.
ButWAN covers great distance and operate nationwide or even
worldwide.
 In LAN, the computer terminals and peripheral devices are
connected with wires and coaxial cables. InWAN there is no
physical connection. Communication is done through telephone
lines and satellite links.
 Cost of data transmission in LAN is less because the transmission
medium is owned by a single organization. In case of WAN the
cost of data transmission is very high because the transmission
medium used are hired, either telephone lines or satellite links.
 The speed of data transmission is much higher in LAN than in
WAN. Few data transmission errors occur in LAN compared to
WAN.
9
NETWORKTOPOLOGY
StarTopology
 In star topology a number of workstations are directly linked to a
central node as the next figure.
 Any communication between stations on a star LAN must pass
through the central node.
 The central node controls all the activities of the nodes.
The advantages of the star topology are:
 It offers flexibility of adding or deleting of workstations from the
network.
 Breakdown of one station does not affect entire system
The major disadvantage of star topology is that failure of the central
node disables communication throughout the whole network
10
Star topolgy
11
BusTopology
 In bus topology all workstations are connected to a
single communication line called bus.
 There is no central node as in star topology.
 Transmission from any station travels the length of the
bus in both directions and can be received by all
workstations.
The advantage of the bus topology is that
 It is quite easy to set up.
 If one station of the topology fails it does not affect
the entire system.
 The disadvantage of bus topology is that any
break in the bus is difficult to identify.
12
BusTopology
13
RingTopology
 In ring topology each station is attached nearby stations
on a point to point basis so that the entire system is in
the form of a ring.
 In this topology data is transmitted in one direction only.
 Thus the data packets circulate along the ring in either
clockwise or anti-clockwise direction.
The advantage of this topology is that any signal
transmitted on the network passes through all the LAN
stations.
The disadvantage of ring network is that the
breakdown of any one station on the ring can disable the
entire system.
14
RingTopology
15
INTERNET
 The Internet is a network of networks
 Computer users on the Internet can contact one
another anywhere in the world
 In Internet a huge resource of information is
accessible to people across the world
 Information in every field starting from education,
science, health, medicine, history, and geography to
business, news, etc. can be retrieved through Internet
 You can also download programs and software
packages from anywhere in the world
16
Origin of Internet
 In 1969 Department of Defense (DOD) of USA
started a network called ARPANET (Advanced
Research Projects Administration Network )
 Around 1970, NSFNET (National Science Foundation
Network) was created.With the advancement of
modern communication facilities,
 By 1990 many computers were looking up to
NSFNET giving birth to Internet
17
Internet functions
 Internet is not a governmental organization.
 The ultimate authority of the Internet is the Internet
Society.
 This is a voluntary membership organization whose
purpose is to promote global information exchange.
 Internet has more than one million computers
attached to it.
18
E-mail
 E-mail stands for electronic mail.
 This is one of the most widely used features of
Internet.
 In electronic mail the data are transmitted
through Internet and therefore within minutes
the message reaches the destination may it be
anywhere in the world.
 Therefore the mailing system is excessively fast
and is being used widely for mail transfer
19
Features of E-mail
1) One-to-one or one-to-many
communications
2) Instant communications
3) Physical presence of recipient is not
required
4) Most inexpensive mail service, 24-hours
a day and seven days a week
5) Encourages informal communication
20
Components of an E-mail Address
 As in the case of normal mail system, e-mail is also
based upon the concept of a recipient address.
 The email address provides all of the information
required to get a message to the recipient from
anywhere in the world. Consider the e-mail ID
 flo@hotmail.com
21
flo@hotmail.com
 In the example above,“flo" is the local part,
which is the name of a mailbox on the
destination computer, where finally the mail
will be delivered.
 Hotmail is the mail server where the
mailbox “flo" exists,
 .com is the type of organization on net
 .edu Educational institutions
 .gov Government site
22
FileTransfer Protocol (FTP)
 FileTransfer Protocol, is an Internet utility
software used to upload and download files.
 It gives access to directories or folders on remote
computers and allows software, data and text files to
be transferred between different kinds of computers.
 FTP works on the basis of same principle as that of
Client/Server.
23
 FTP "Client" is a program running on the your
computer that enables you to talk to, and get stuff
from, remote computers.
 The FTP client takes FTP commands and sends them
as requests for information from the remote
computer or known as FTP servers.
 To access remote FTP server it is required but not
necessary to have an account in the FTP server.
 When the FTP client gets connected
24
The objectives of FTP
The basic objectives of FTP are
 to give flexibility and promote sharing of
computer programs, files and data
 to transfer data reliably and more
efficiently over network
 to encourage implicit or indirect use of
remote computers using Internet
 to shield a user from variations in file
storage systems among hosts
25
Telnet (Remote Computing)
 Telnet or remote computing is telecommunication utility software,
which uses available telecommunication facility and allows you to
become a user on a remote computer.
 Once you gain access to the remote computer, you can use it for
the intended purpose.
 The TELNET works in a very step by step procedure.The
commands typed on the client computer are sent to the local
Internet Service Provider (ISP), and then from the ISP to the
remote computer that you have gained access.
 Most of the ISP provides facility toTELNET into your own
account from another city and check your e-mail while you are
traveling or away.
26
WORLD WIDE WEB (WWW)
 WWW is the short form for the World WideWeb. It is also
commonly known as ‘The Web’.
 The WWW is hypertext based information retrieval tool.
 One can easily surf the Web by jumping from one document to
another using the links in those documents.
 These documents can be in many formats, such as text,
graphics, animation, sound and latest is video.They may also be
a combination of all these.
 All the information on Internet are presented to the user as a
document or more popularly known as Web Page.
 All these Web Pages are link to each other or even to section
within a Web Page.And these links are known as Hyper Links.
27
The Web browser
 The tool used to view theseWeb Pages on Internet is
known as Internet browser or simply browser.
 It is a software program specifically developed to
extract information on user request from the Internet
and present them as a Web Page to the viewer
 The most popular are Internet Explorer from Microsoft
and Netscape from Netscape Inc
28

More Related Content

What's hot

Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networksamudha arul
 
Data Communication and Networking
Data Communication and NetworkingData Communication and Networking
Data Communication and NetworkingAnjan Mahanta
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAAiman Hud
 
Data Communication and Networks
Data Communication and NetworksData Communication and Networks
Data Communication and NetworksChAwais15
 
Computer networking
Computer networkingComputer networking
Computer networkingAbdul Rehman
 
Module1 introduction to network
Module1 introduction to networkModule1 introduction to network
Module1 introduction to networkMiz Malinz
 
Network adpater,cabel,cards ,types, network devices
Network adpater,cabel,cards ,types, network devicesNetwork adpater,cabel,cards ,types, network devices
Network adpater,cabel,cards ,types, network devicesJafar Nesargi
 
Data communication and network
Data communication and networkData communication and network
Data communication and networkHardik Patel
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 7 - Compute...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 7 - Compute...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 7 - Compute...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 7 - Compute...yaminohime
 
ENTERPRISE NETWORKING
ENTERPRISE NETWORKINGENTERPRISE NETWORKING
ENTERPRISE NETWORKINGbwire sedrick
 
Introduction to computer_lec_05_fall_2018
Introduction to computer_lec_05_fall_2018Introduction to computer_lec_05_fall_2018
Introduction to computer_lec_05_fall_2018Ramadan Babers, PhD
 
Super final-report
Super final-reportSuper final-report
Super final-reportJaveria600
 
Computer Networks Module I
Computer Networks Module IComputer Networks Module I
Computer Networks Module IAjit Nayak
 

What's hot (20)

Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
 
Data Communication and Networking
Data Communication and NetworkingData Communication and Networking
Data Communication and Networking
 
Lan pan class 12 ppt
Lan pan class 12 pptLan pan class 12 ppt
Lan pan class 12 ppt
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 
Data Communication and Networks
Data Communication and NetworksData Communication and Networks
Data Communication and Networks
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Computer network
Computer networkComputer network
Computer network
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
What is network
What is networkWhat is network
What is network
 
Module1 introduction to network
Module1 introduction to networkModule1 introduction to network
Module1 introduction to network
 
Network adpater,cabel,cards ,types, network devices
Network adpater,cabel,cards ,types, network devicesNetwork adpater,cabel,cards ,types, network devices
Network adpater,cabel,cards ,types, network devices
 
Introduction to computer_lec_05
Introduction to computer_lec_05Introduction to computer_lec_05
Introduction to computer_lec_05
 
Data communication and network
Data communication and networkData communication and network
Data communication and network
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 7 - Compute...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 7 - Compute...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 7 - Compute...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 7 - Compute...
 
COMPUTER NETWORKS
COMPUTER NETWORKSCOMPUTER NETWORKS
COMPUTER NETWORKS
 
ENTERPRISE NETWORKING
ENTERPRISE NETWORKINGENTERPRISE NETWORKING
ENTERPRISE NETWORKING
 
Introduction to computer_lec_05_fall_2018
Introduction to computer_lec_05_fall_2018Introduction to computer_lec_05_fall_2018
Introduction to computer_lec_05_fall_2018
 
Networks
NetworksNetworks
Networks
 
Super final-report
Super final-reportSuper final-report
Super final-report
 
Computer Networks Module I
Computer Networks Module IComputer Networks Module I
Computer Networks Module I
 

Similar to M.Florence Dayana Computer Networks Types

Computer application-chapter four lecture note. pptx
Computer application-chapter four lecture note. pptxComputer application-chapter four lecture note. pptx
Computer application-chapter four lecture note. pptxgadisaAdamu
 
Computer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.pptComputer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.pptmv9499596
 
Class Note
Class NoteClass Note
Class NoteAK IJ
 
Introduction to Networking And its Types
Introduction to Networking And its TypesIntroduction to Networking And its Types
Introduction to Networking And its TypesHamzaHaji8
 
Computer Networking
Computer NetworkingComputer Networking
Computer NetworkingDeven Sahu
 
Concept of Networking and Operating System.
Concept of Networking and Operating System.Concept of Networking and Operating System.
Concept of Networking and Operating System.AnshulAnand21
 
presentation_internet.pptx
presentation_internet.pptxpresentation_internet.pptx
presentation_internet.pptxbantisworld
 
computer networks
computer networkscomputer networks
computer networksdee_rosal
 
Computer Networks: Evolution of Computer Networks.pptx
Computer Networks: Evolution of Computer Networks.pptxComputer Networks: Evolution of Computer Networks.pptx
Computer Networks: Evolution of Computer Networks.pptxVishwaTej10
 
Computer Network By Pawan Thakur HOD CS & IT VIM BHOPAL
Computer Network By Pawan Thakur HOD CS & IT VIM BHOPALComputer Network By Pawan Thakur HOD CS & IT VIM BHOPAL
Computer Network By Pawan Thakur HOD CS & IT VIM BHOPALGovt. P.G. College Dharamshala
 
Introduction to networking by vikas jagtap
 Introduction to networking by vikas jagtap Introduction to networking by vikas jagtap
Introduction to networking by vikas jagtapVikas Jagtap
 
Computer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsComputer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsSubas Paudel
 
data communication and networking
data communication and networkingdata communication and networking
data communication and networkingprashanna13
 
Install network cable module CSS NC2
Install network cable module CSS NC2Install network cable module CSS NC2
Install network cable module CSS NC2wilfredo dela cerna
 
Computer networking project
Computer networking projectComputer networking project
Computer networking projectAshifimrankhan1
 
Computer network
Computer networkComputer network
Computer networkNeha Gupta
 

Similar to M.Florence Dayana Computer Networks Types (20)

Computer application-chapter four lecture note. pptx
Computer application-chapter four lecture note. pptxComputer application-chapter four lecture note. pptx
Computer application-chapter four lecture note. pptx
 
The basics of computer networking
The basics of computer networkingThe basics of computer networking
The basics of computer networking
 
Computer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.pptComputer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.ppt
 
Class Note
Class NoteClass Note
Class Note
 
Networking
NetworkingNetworking
Networking
 
Introduction to Networking And its Types
Introduction to Networking And its TypesIntroduction to Networking And its Types
Introduction to Networking And its Types
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Concept of Networking and Operating System.
Concept of Networking and Operating System.Concept of Networking and Operating System.
Concept of Networking and Operating System.
 
Unit 2B.pdf
Unit 2B.pdfUnit 2B.pdf
Unit 2B.pdf
 
presentation_internet.pptx
presentation_internet.pptxpresentation_internet.pptx
presentation_internet.pptx
 
computer networks
computer networkscomputer networks
computer networks
 
Computer Networks: Evolution of Computer Networks.pptx
Computer Networks: Evolution of Computer Networks.pptxComputer Networks: Evolution of Computer Networks.pptx
Computer Networks: Evolution of Computer Networks.pptx
 
Computer Network By Pawan Thakur HOD CS & IT VIM BHOPAL
Computer Network By Pawan Thakur HOD CS & IT VIM BHOPALComputer Network By Pawan Thakur HOD CS & IT VIM BHOPAL
Computer Network By Pawan Thakur HOD CS & IT VIM BHOPAL
 
Introduction to networking by vikas jagtap
 Introduction to networking by vikas jagtap Introduction to networking by vikas jagtap
Introduction to networking by vikas jagtap
 
Computer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsComputer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber Ethics
 
data communication and networking
data communication and networkingdata communication and networking
data communication and networking
 
Install network cable module CSS NC2
Install network cable module CSS NC2Install network cable module CSS NC2
Install network cable module CSS NC2
 
Computer networking project
Computer networking projectComputer networking project
Computer networking project
 
Networking Fundamentals.ppt
Networking Fundamentals.pptNetworking Fundamentals.ppt
Networking Fundamentals.ppt
 
Computer network
Computer networkComputer network
Computer network
 

More from Dr.Florence Dayana

Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdf
Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdfDr.M.Florence Dayana-Cloud Computing-unit - 4.pdf
Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdfDr.Florence Dayana
 
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdfDr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdfDr.Florence Dayana
 
M. Florence Dayana - Hadoop Foundation for Analytics.pptx
M. Florence Dayana - Hadoop Foundation for Analytics.pptxM. Florence Dayana - Hadoop Foundation for Analytics.pptx
M. Florence Dayana - Hadoop Foundation for Analytics.pptxDr.Florence Dayana
 
M. FLORENCE DAYANA/unit - II logic gates and circuits.pdf
M. FLORENCE DAYANA/unit - II logic gates and circuits.pdfM. FLORENCE DAYANA/unit - II logic gates and circuits.pdf
M. FLORENCE DAYANA/unit - II logic gates and circuits.pdfDr.Florence Dayana
 
M.FLORENCE DAYANA/electronic mail security.pdf
M.FLORENCE DAYANA/electronic mail security.pdfM.FLORENCE DAYANA/electronic mail security.pdf
M.FLORENCE DAYANA/electronic mail security.pdfDr.Florence Dayana
 
M. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdf
M. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdfM. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdf
M. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdfDr.Florence Dayana
 
Professional English - Reading
Professional English - ReadingProfessional English - Reading
Professional English - ReadingDr.Florence Dayana
 
Professional English - Speaking
Professional English - SpeakingProfessional English - Speaking
Professional English - SpeakingDr.Florence Dayana
 
Professional English - Listening
Professional English - ListeningProfessional English - Listening
Professional English - ListeningDr.Florence Dayana
 
Network Security- Secure Socket Layer
Network Security- Secure Socket LayerNetwork Security- Secure Socket Layer
Network Security- Secure Socket LayerDr.Florence Dayana
 
M.florence dayana dream weaver
M.florence dayana   dream weaverM.florence dayana   dream weaver
M.florence dayana dream weaverDr.Florence Dayana
 
M.florence dayana computer networks transport layer
M.florence dayana   computer networks transport layerM.florence dayana   computer networks transport layer
M.florence dayana computer networks transport layerDr.Florence Dayana
 
M.Florence Dayana Computer Networks Introduction
M.Florence Dayana   Computer Networks IntroductionM.Florence Dayana   Computer Networks Introduction
M.Florence Dayana Computer Networks IntroductionDr.Florence Dayana
 
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEMM. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEMDr.Florence Dayana
 
M.Florence Dayana / Basics of C Language
M.Florence Dayana / Basics of C LanguageM.Florence Dayana / Basics of C Language
M.Florence Dayana / Basics of C LanguageDr.Florence Dayana
 
M.Florence Dayana/Cryptography and Network security
M.Florence Dayana/Cryptography and Network securityM.Florence Dayana/Cryptography and Network security
M.Florence Dayana/Cryptography and Network securityDr.Florence Dayana
 
M.FLORENCE DAYANA WEB DESIGN -Unit 5 XML
M.FLORENCE DAYANA WEB DESIGN -Unit 5   XMLM.FLORENCE DAYANA WEB DESIGN -Unit 5   XML
M.FLORENCE DAYANA WEB DESIGN -Unit 5 XMLDr.Florence Dayana
 

More from Dr.Florence Dayana (20)

Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdf
Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdfDr.M.Florence Dayana-Cloud Computing-unit - 4.pdf
Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdf
 
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdfDr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
 
M. Florence Dayana - Hadoop Foundation for Analytics.pptx
M. Florence Dayana - Hadoop Foundation for Analytics.pptxM. Florence Dayana - Hadoop Foundation for Analytics.pptx
M. Florence Dayana - Hadoop Foundation for Analytics.pptx
 
M. FLORENCE DAYANA/unit - II logic gates and circuits.pdf
M. FLORENCE DAYANA/unit - II logic gates and circuits.pdfM. FLORENCE DAYANA/unit - II logic gates and circuits.pdf
M. FLORENCE DAYANA/unit - II logic gates and circuits.pdf
 
M.FLORENCE DAYANA/electronic mail security.pdf
M.FLORENCE DAYANA/electronic mail security.pdfM.FLORENCE DAYANA/electronic mail security.pdf
M.FLORENCE DAYANA/electronic mail security.pdf
 
M. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdf
M. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdfM. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdf
M. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdf
 
Professional English - Reading
Professional English - ReadingProfessional English - Reading
Professional English - Reading
 
Professional English - Speaking
Professional English - SpeakingProfessional English - Speaking
Professional English - Speaking
 
Professional English - Listening
Professional English - ListeningProfessional English - Listening
Professional English - Listening
 
INPUT AND OUTPUT DEVICES.pdf
INPUT  AND OUTPUT DEVICES.pdfINPUT  AND OUTPUT DEVICES.pdf
INPUT AND OUTPUT DEVICES.pdf
 
NETWORK SECURITY-SET.pptx
NETWORK SECURITY-SET.pptxNETWORK SECURITY-SET.pptx
NETWORK SECURITY-SET.pptx
 
Network Security- Secure Socket Layer
Network Security- Secure Socket LayerNetwork Security- Secure Socket Layer
Network Security- Secure Socket Layer
 
M.florence dayana dream weaver
M.florence dayana   dream weaverM.florence dayana   dream weaver
M.florence dayana dream weaver
 
M.florence dayana computer networks transport layer
M.florence dayana   computer networks transport layerM.florence dayana   computer networks transport layer
M.florence dayana computer networks transport layer
 
M.Florence Dayana Computer Networks Introduction
M.Florence Dayana   Computer Networks IntroductionM.Florence Dayana   Computer Networks Introduction
M.Florence Dayana Computer Networks Introduction
 
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEMM. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
 
M.Florence Dayana
M.Florence DayanaM.Florence Dayana
M.Florence Dayana
 
M.Florence Dayana / Basics of C Language
M.Florence Dayana / Basics of C LanguageM.Florence Dayana / Basics of C Language
M.Florence Dayana / Basics of C Language
 
M.Florence Dayana/Cryptography and Network security
M.Florence Dayana/Cryptography and Network securityM.Florence Dayana/Cryptography and Network security
M.Florence Dayana/Cryptography and Network security
 
M.FLORENCE DAYANA WEB DESIGN -Unit 5 XML
M.FLORENCE DAYANA WEB DESIGN -Unit 5   XMLM.FLORENCE DAYANA WEB DESIGN -Unit 5   XML
M.FLORENCE DAYANA WEB DESIGN -Unit 5 XML
 

Recently uploaded

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 

Recently uploaded (20)

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 

M.Florence Dayana Computer Networks Types

  • 1. COMPUTER NETWORKS MS. M. FLORENCE DAYANA ASST. PROFESSOR IN BCA, BON SECOURS COLLEGE FOR WOMEN,THANJAVUR 1
  • 2. COMPUTER NETWORKS  A computer network is an interconnection of various computer systems located at different places  Two or more computers are linked together with a medium and data communication devices for the purpose of communicating data and sharing resources  The computer that provides resources to other computers on a network is known as server.  Individual computers in the network, which access shared network resources, are known as nodes. 2
  • 3. Local Area Network (LAN)  Networks used to interconnect computers in a single room, rooms within a building or buildings on one site are called Local Area Network (LAN).  LAN transmits data with a speed of several megabits per second  The transmission medium is normally coaxial cables.  LAN links computers, in the same area for the purpose of sharing information.  Usually LAN links computers within a limited geographical area because they must be connected by a cable, which is quite expensive.  People working in LAN get more capabilities in data processing, work processing and other information exchange compared to stand-alone computers. 3
  • 4. Characteristics of LAN 1) every computer has the potential to communicate with any other computers of the network 2) high degree of connection between computers 3) easy physical connection of computers in a network 4) inexpensive medium of data transmission 5) high data transmission rate 4
  • 5. Use of LAN 1) File transfers and Access 2) Word and text processing 3) Electronic message handling 4) Remote database access 5) Personal computing 6) Digital voice transmission and storage 5
  • 6. Wide Area Network  The termWide Area Network (WAN) is used to describe a computer network spanning a regional, national or global area.  For example, for a large company the head quarters might be at Cairo and regional branches at Mansoura,Tanta , and Aswan.  the transmission medium used are normally telephone lines, microwaves and satellite links 6
  • 7. The characteristics of WAN  Communication Facility: For a big company spanning over the country the employees can save long distance phone calls and it overcomes the time lag in overseas communications.  Computer conferencing is another use ofWAN where users communicate with each other through their computer system. 7
  • 8.  Remote Data Entry is possible in WAN. It means sitting at any location you can enter data, update data and query other information of any computer attached to the WAN  Centralized Information: This means if the organization is spread over many cities, they keep their important business data in a single place.WAN permits collection of this data from different sites and save at a single site 8
  • 9. Difference between LAN and WAN  LAN is restricted to limited geographical area of few kilometers. ButWAN covers great distance and operate nationwide or even worldwide.  In LAN, the computer terminals and peripheral devices are connected with wires and coaxial cables. InWAN there is no physical connection. Communication is done through telephone lines and satellite links.  Cost of data transmission in LAN is less because the transmission medium is owned by a single organization. In case of WAN the cost of data transmission is very high because the transmission medium used are hired, either telephone lines or satellite links.  The speed of data transmission is much higher in LAN than in WAN. Few data transmission errors occur in LAN compared to WAN. 9
  • 10. NETWORKTOPOLOGY StarTopology  In star topology a number of workstations are directly linked to a central node as the next figure.  Any communication between stations on a star LAN must pass through the central node.  The central node controls all the activities of the nodes. The advantages of the star topology are:  It offers flexibility of adding or deleting of workstations from the network.  Breakdown of one station does not affect entire system The major disadvantage of star topology is that failure of the central node disables communication throughout the whole network 10
  • 12. BusTopology  In bus topology all workstations are connected to a single communication line called bus.  There is no central node as in star topology.  Transmission from any station travels the length of the bus in both directions and can be received by all workstations. The advantage of the bus topology is that  It is quite easy to set up.  If one station of the topology fails it does not affect the entire system.  The disadvantage of bus topology is that any break in the bus is difficult to identify. 12
  • 14. RingTopology  In ring topology each station is attached nearby stations on a point to point basis so that the entire system is in the form of a ring.  In this topology data is transmitted in one direction only.  Thus the data packets circulate along the ring in either clockwise or anti-clockwise direction. The advantage of this topology is that any signal transmitted on the network passes through all the LAN stations. The disadvantage of ring network is that the breakdown of any one station on the ring can disable the entire system. 14
  • 16. INTERNET  The Internet is a network of networks  Computer users on the Internet can contact one another anywhere in the world  In Internet a huge resource of information is accessible to people across the world  Information in every field starting from education, science, health, medicine, history, and geography to business, news, etc. can be retrieved through Internet  You can also download programs and software packages from anywhere in the world 16
  • 17. Origin of Internet  In 1969 Department of Defense (DOD) of USA started a network called ARPANET (Advanced Research Projects Administration Network )  Around 1970, NSFNET (National Science Foundation Network) was created.With the advancement of modern communication facilities,  By 1990 many computers were looking up to NSFNET giving birth to Internet 17
  • 18. Internet functions  Internet is not a governmental organization.  The ultimate authority of the Internet is the Internet Society.  This is a voluntary membership organization whose purpose is to promote global information exchange.  Internet has more than one million computers attached to it. 18
  • 19. E-mail  E-mail stands for electronic mail.  This is one of the most widely used features of Internet.  In electronic mail the data are transmitted through Internet and therefore within minutes the message reaches the destination may it be anywhere in the world.  Therefore the mailing system is excessively fast and is being used widely for mail transfer 19
  • 20. Features of E-mail 1) One-to-one or one-to-many communications 2) Instant communications 3) Physical presence of recipient is not required 4) Most inexpensive mail service, 24-hours a day and seven days a week 5) Encourages informal communication 20
  • 21. Components of an E-mail Address  As in the case of normal mail system, e-mail is also based upon the concept of a recipient address.  The email address provides all of the information required to get a message to the recipient from anywhere in the world. Consider the e-mail ID  flo@hotmail.com 21
  • 22. flo@hotmail.com  In the example above,“flo" is the local part, which is the name of a mailbox on the destination computer, where finally the mail will be delivered.  Hotmail is the mail server where the mailbox “flo" exists,  .com is the type of organization on net  .edu Educational institutions  .gov Government site 22
  • 23. FileTransfer Protocol (FTP)  FileTransfer Protocol, is an Internet utility software used to upload and download files.  It gives access to directories or folders on remote computers and allows software, data and text files to be transferred between different kinds of computers.  FTP works on the basis of same principle as that of Client/Server. 23
  • 24.  FTP "Client" is a program running on the your computer that enables you to talk to, and get stuff from, remote computers.  The FTP client takes FTP commands and sends them as requests for information from the remote computer or known as FTP servers.  To access remote FTP server it is required but not necessary to have an account in the FTP server.  When the FTP client gets connected 24
  • 25. The objectives of FTP The basic objectives of FTP are  to give flexibility and promote sharing of computer programs, files and data  to transfer data reliably and more efficiently over network  to encourage implicit or indirect use of remote computers using Internet  to shield a user from variations in file storage systems among hosts 25
  • 26. Telnet (Remote Computing)  Telnet or remote computing is telecommunication utility software, which uses available telecommunication facility and allows you to become a user on a remote computer.  Once you gain access to the remote computer, you can use it for the intended purpose.  The TELNET works in a very step by step procedure.The commands typed on the client computer are sent to the local Internet Service Provider (ISP), and then from the ISP to the remote computer that you have gained access.  Most of the ISP provides facility toTELNET into your own account from another city and check your e-mail while you are traveling or away. 26
  • 27. WORLD WIDE WEB (WWW)  WWW is the short form for the World WideWeb. It is also commonly known as ‘The Web’.  The WWW is hypertext based information retrieval tool.  One can easily surf the Web by jumping from one document to another using the links in those documents.  These documents can be in many formats, such as text, graphics, animation, sound and latest is video.They may also be a combination of all these.  All the information on Internet are presented to the user as a document or more popularly known as Web Page.  All these Web Pages are link to each other or even to section within a Web Page.And these links are known as Hyper Links. 27
  • 28. The Web browser  The tool used to view theseWeb Pages on Internet is known as Internet browser or simply browser.  It is a software program specifically developed to extract information on user request from the Internet and present them as a Web Page to the viewer  The most popular are Internet Explorer from Microsoft and Netscape from Netscape Inc 28