SlideShare a Scribd company logo
1 of 18
TYPES OF NETWORKS
IS A NETWORK USED OVER AN EXTREMELY LARGE
GEOGRAPHICAL AREA SUCH AS THE FEDERAL
GOVERNMENT.
BUS TOPOLOGY
STAR TOPOLOGY
RING TOPOLOGY
EXTENDED STAR
HIERARCHICAL
MESH
ALLOWS INFORMATION TO BE DIRECTED FROM ONE COMPUTER TO THE OTHER.
LOTS OF BINARY COLLISION THOUGH.
IS THE MOST COMMON TYPE USED. ALL COMPUTERS ARE ATTACHED TO A HUB.
LESS COLLISIONS AND MOST EFFICIENT.
A DISADVANTAGE OF A TOKEN RING IS IF ONE COMPUTER IS BROKEN OR DOWN,
THE MESSAGE CANNOT BE PASSED TO THE OTHER COMPUTERS.
TWISTED SHIELDED PAIR – USED IN PHONE LINES, NETWORKS

UNSHIELDED TWISTED PAIR-USED IN PHONE LINES, NETWORKS
COAXIAL CABLE

USED IN CABLEVISION GREAT FOR VIDEO
FIBRE OPTIC CABLES
- USES LIGHT TO CARRY SIGNAL BUT HARD TO WORK WITH AND
LOOSES SIGNAL OVER LONGER DISTANCES
Wiring:
1-3 White/Orange
2-6 Orange
3-1 White/Green
6-2 Green
4-4 Blue
5-5 White/Blue
7-7 White/Brown
8-8 Brown
CRIMPING TOOL

HUB

ROUTER
Every machine on the Internet has a unique
identifying number, called an IP Address.

A typical IP address looks like this:

216.27.61.137

But computers communicate in binary form.
9.00

8.00
7.00
6.00

Internet user

5.00
Global population

4.00
3.00

Linear (Global
population)

2.00
1.00
0.00
2000

2010

2020
Computer networking

More Related Content

Similar to Computer networking

Network Topology
Network TopologyNetwork Topology
Network Topology
Malik Mehrose
 

Similar to Computer networking (20)

Computer network transmission channel & topology
Computer network transmission channel & topologyComputer network transmission channel & topology
Computer network transmission channel & topology
 
Network Media Types.pptx
Network Media Types.pptxNetwork Media Types.pptx
Network Media Types.pptx
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 
wireless communication
wireless communicationwireless communication
wireless communication
 
Wireless communication ppt by dinesh
Wireless communication ppt by dineshWireless communication ppt by dinesh
Wireless communication ppt by dinesh
 
Network Media Types.pptx
Network Media Types.pptxNetwork Media Types.pptx
Network Media Types.pptx
 
NETWORK TOPOLOGIES IN COMPUTER NETWORKING.pptx
NETWORK TOPOLOGIES IN COMPUTER NETWORKING.pptxNETWORK TOPOLOGIES IN COMPUTER NETWORKING.pptx
NETWORK TOPOLOGIES IN COMPUTER NETWORKING.pptx
 
C n practical file
C n practical fileC n practical file
C n practical file
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
Mr.r.p singh
Mr.r.p singhMr.r.p singh
Mr.r.p singh
 
Transmission Media and Topologies .pdf
Transmission Media and Topologies   .pdfTransmission Media and Topologies   .pdf
Transmission Media and Topologies .pdf
 
What Is A Network made by Ms. Archika Bhatia
What Is A Network made by Ms. Archika BhatiaWhat Is A Network made by Ms. Archika Bhatia
What Is A Network made by Ms. Archika Bhatia
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Transmission Medium
Transmission MediumTransmission Medium
Transmission Medium
 
7 topology ethernet
7 topology ethernet7 topology ethernet
7 topology ethernet
 
Wired Transmission Media
Wired Transmission MediaWired Transmission Media
Wired Transmission Media
 
Computer Network - OSI model
Computer Network - OSI modelComputer Network - OSI model
Computer Network - OSI model
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Comm media
Comm mediaComm media
Comm media
 
Comm media
Comm mediaComm media
Comm media
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
Overkill Security
 

Recently uploaded (20)

Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi Daparthi
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 

Computer networking