SlideShare a Scribd company logo
1 of 40
Welcome to My PPT
Presented by- Ram nivas sonkar
TOPIC- INTRODUCTION TO
COMPUTER NETWORKS
CONTENT
 INTRODUCTION
 WHAT IS COMPUTER NETWORKS?
 COMPONENTS OF COMPUTER NETWORKS
 TYPES OF COMPUTER NETWORKS
 ADVANTAGE AND DISADVANTAGES OF COMPUTER NETWORKS
 NETWORK TOPOLOGY
 WIRELESS NETWORK
 WHAT IS OSI MODEL
Introduction
 Computer networks connect two or more Computer .
 The computers can be geographical located anywhere .
What is computer Network?
Computer networking refers to interconnected computing
devices that can exchange data and share resources with
each other. These networked devices use a system of
rules, called communications protocols, to transmit
information over physical or wireless technologies.
Components of Computer networks
Type of computer network
 A computer network is a group of computers linked to each
other that enables the computer to communicate with another
computer and share their resources, data, and applications.
 A computer network can be categorized by their size. A computer
network is mainly of four types:
 LAN(Local Area Network)
 MAN(Metropolitan Area Network)
 WAN(Wide Area Network)
 PAN(Personal Area Network)
LAN(Local Area Network)
 Local Area Network is a group of computers connected to each other
in a small area such as building, office.
 LAN is used for connecting two or more personal computers through
a communication medium such as twisted pair, coaxial cable, etc.
 It is less costly as it is built with inexpensive hardware such as hubs,
network adapters, and ethernet cables.
 The data is transferred at an extremely faster rate in Local Area
Network.
 Local Area Network provides higher security.
MAN(Metropolitan Area Network)
 A metropolitan area network is a network that covers a larger
geographic area by interconnecting a different LAN to form a larger
network.
 Government agencies use MAN to connect to the citizens and private
industries.
 In MAN, various LANs are connected to each other through a
telephone exchange line.
 The most widely used protocols in MAN are RS-232, Frame Relay,
ATM, ISDN, OC-3, ADSL, etc.
 It has a higher range than Local Area Network(LAN).
Uses Of Metropolitan Area Network:
MAN is used in communication between the banks in a city.
It can be used in an Airline Reservation.
It can be used in a college within a city.
It can also be used for communication in the military.
WAN(Wide Area Network)
 A Wide Area Network is a network that extends over a large
geographical area such as states or countries.
 A Wide Area Network is quite bigger network than the LAN.
 A Wide Area Network is not limited to a single location, but it
spans over a large geographical area through a telephone line,
fibre optic cable or satellite links.
 The internet is one of the biggest WAN in the world.
 A Wide Area Network is widely used in the field of Business,
government, and education.
Examples Of Wide Area Network:
Mobile Broadband: A 4G network is widely used across a region or
country.
Last mile: A telecom company is used to provide the internet services to
the customers in hundreds of cities by connecting their home with fiber.
Private network: A bank provides a private network that connects the 44
offices. This network is made by using the telephone leased line provided
by the telecom company.
Advantages Of Wide Area Network:
Following are the advantages of the Wide Area Network:
 Geographical area: A Wide Area Network provides a large geographical
area. Suppose if the branch of our office is in a different city then we
can connect with them through WAN. The internet provides a leased
line through which we can connect with another branch.
 Centralized data: In case of WAN network, data is centralized.
Therefore, we do not need to buy the emails, files or back up servers.
 Get updated files: Software companies work on the live server.
Therefore, the programmers get the updated files within seconds.
 Exchange messages: In a WAN network, messages are transmitted
fast. The web application like Facebook, Whatsapp, Skype allows you
to communicate with friends.
 Sharing of software and resources: In WAN network, we can share the
software and other resources like a hard drive, RAM.
 Global business: We can do the business over the internet globally.
 High bandwidth: If we use the leased lines for our company then this
gives the high bandwidth. The high bandwidth increases the data
transfer rate which in turn increases the productivity of our company.
Disadvantages of Wide Area Network:
The following are the disadvantages of the Wide Area
Network:
 Security issue: A WAN network has more security issues as compared
to LAN and MAN network as all the technologies are combined
together that creates the security problem.
 Needs Firewall & antivirus software: The data is transferred on the
internet which can be changed or hacked by the hackers, so the
firewall needs to be used. Some people can inject the virus in our
system so antivirus is needed to protect from such a virus.
 High Setup cost: An installation cost of the WAN network is high as it
involves the purchasing of routers, switches.
 Troubleshooting problems: It covers a large area so fixing the problem
is difficult.
Network Topology
Types of Network Topology
 The arrangement of a network that comprises nodes and connecting lines
via sender and receiver is referred to as network topology. The various
network topologies are:
 Mesh Topology
 Star Topology
 Bus Topology
 Ring Topology
 Tree Topology
 Hybrid Topology
Mesh Topology:
 In a mesh topology, every device is connected to another device via a particular
channel. In Mesh Topology, the protocols used are AHCP (Ad Hoc Configuration
Protocols), DHCP (Dynamic Host Configuration Protocol), etc.

Every device is connected to another
via dedicated channels. These channels
are known as links.
Advantages of this topology:
 Communication is very fast between the nodes.
 It is robust.
 The fault is diagnosed easily. Data is reliable because data is transferred among
the devices through dedicated channels or links.
 Provides security and privacy.
Disadvantaged of this topology:
• Installation and configuration are difficult.
• The cost of cables is high as bulk wiring is required, hence suitable for less
number of devices.
• The cost of maintenance is high.
Star Topology:
 In star topology, all the devices are connected to a single hub through a
cable. This hub is the central node and all other nodes are connected to
the central node. The hub can be passive in nature i.e., not an
intelligent hub such as broadcasting devices, at the same time the hub
can be intelligent known as an active hub. Active hubs have repeaters
in them. Coaxial cables or RJ-45 cables are used to connect the
computers. In Star Topology, many popular Ethernet LAN protocols are
used as CD(Collision Detection), CSMA (Carrier Sense Multiple Access),
etc.
A star topology having four systems connected
to a single point of connection i.e. hub.
Advantages of this topology:
If N devices are connected to each other in a star topology, then the
number of cables required to connect them is N. So, it is easy to set up.
Each device requires only 1 port i.e. to connect to the hub, therefore the
total number of ports required is N.
It is Robust. If one link fails only that link will affect and not other than
that.
Easy to fault identification and fault isolation.
Star topology is cost-effective as it uses inexpensive coaxial cable.
Disadvantage of this topology:
•If the concentrator (hub) on which the whole topology
relies fails, the whole system will crash down.
•The cost of installation is high.
•Performance is based on the single concentrator i.e.
hub.
Bus Topology:
 Bus topology is a network type in which every computer and
network device is connected to a single cable. It is bi-
directional. It is a multi-point connection and a non-robust
topology because if the backbone fails the topology crashes.
In Bus Topology, various MAC (Media Access Control)
protocols are followed by LAN ethernet connections like
TDMA, Pure Aloha, CDMA, Slotted Aloha, etc
A bus topology with shared backbone
cable. The nodes are connected to the
channel via drop lines.
Advantages of this topology:
 If N devices are connected to each other in a bus topology, then the
number of cables required to connect them is 1, known as backbone cable,
and N drop lines are required.
 Coaxial or twisted pair cables are mainly used in bus-based networks that
support up to 10 Mbps.
 The cost of the cable is less compared to other topologies, but it is used to
build small networks.
 Bus topology is familiar technology as installation and troubleshooting
techniques are well known.
Problems with this topology:
•A bus topology is quite simpler, but still, it requires a lot of cabling.
•If the common cable fails, then the whole system will crash down.
•If the network traffic is heavy, it increases collisions in the network. To avoid this,
various protocols are used in the MAC layer known as Pure Aloha, Slotted Aloha,
CSMA/CD, etc.
•Adding new devices to the network would slow down networks.
•Security is very low.
Ring Topology:
 In this topology, it forms a ring connecting devices with exactly two
neighboring devices.
 A number of repeaters are used for Ring topology with a large number
of nodes, because if someone wants to send some data to the last
node in the ring topology with 100 nodes, then the data will have to
pass through 99 nodes to reach the 100th node. Hence to prevent data
loss repeaters are used in the network.
 The data flows in one direction, i.e.., it is unidirectional, but it can be
made bidirectional by having 2 connections between each Network
Node, it is called Dual Ring Topology. In-Ring Topology, the Token
Ring Passing protocol is used by the workstations to transmit the data.
A ring topology comprises 4 stations connected with each forming a ring.
The most common access method of ring topology is token passing.
The most common access method of ring
topology is token passing.
•Token passing: It is a network access
method in which a token is passed from
one node to another node.
•Token: It is a frame that circulates
around the network.
Advantages of this topology:
 The data transmission is high-speed.
 The possibility of collision is minimum in this type of topology.
 Cheap to install and expand.
 It is less costly than a star topology
Problems with this topology:
 The failure of a single node in the network can cause the entire network to fail.
 Troubleshooting is difficult in this topology.
 The addition of stations in between or the removal of stations can disturb the
whole topology.
 Less secure.
Tree Topology :
 This topology is the variation of the Star topology. This topology has a
hierarchical flow of data. In Tree Topology, protocols like DHCP and
SAC (Standard Automatic Configuration ) are used.
In this, the various secondary hubs are connected to the central hub
which contains the repeater. This data flow from top to bottom i.e.
from the central hub to the secondary and then to the devices or from
bottom to top i.e. devices to the secondary hub and then to the
central hub. It is a multi-point connection and a non-robust topology
because if the backbone fails the topology crashes.
 Advantages of this topology :
 It allows more devices to be attached to a single central hub thus it decreases
the distance that is traveled by the signal to come to the devices.
 It allows the network to get isolated and also prioritize from different
computers.
 We can add new devices to the existing network.
 Error detection and error correction are very easy in a tree topology.
 Problems with this topology :
 If the central hub gets fails the entire system fails.
 The cost is high because of the cabling.
 If new devices are added, it becomes difficult to reconfigure.
Hybrid Topology :
 This topological technology is the combination of all the various
types of topologies we have studied above. It is used when the
nodes are free to take any form. It means these can be individuals
such as Ring or Star topology or can be a combination of various
types of topologies seen above. Each individual topology uses the
protocol that has been discussed earlier.
figure shows the structure of the Hybrid topology. As seen it contains a
combination of all different types of networks.
 Advantages of this topology :
 This topology is very flexible.
 The size of the network can be easily expanded by adding new
devices.
 Problems with this topology :
 It is challenging to design the architecture of the Hybrid Network.
 Hubs used in this topology are very expensive.
 The infrastructure cost is very high as a hybrid network requires a
lot of cabling and network devices.
Wireless Networks
Computer networks that are not connected by cables are called wireless networks.
They generally use radio waves for communication between the network nodes. They
allow devices to be connected to the network while roaming around within the network
coverage.
Types of Wireless Networks
 Wireless LANs − Connects two or more network devices using
wireless distribution techniques.
 Wireless MANs − Connects two or more wireless LANs spreading
over a metropolitan area.
 Wireless WANs − Connects large areas comprising LANs, MANs
and personal networks.
Advantages of Wireless Networks:
•It provides clutter-free desks due to the absence of
wires and cables.
•It increases the mobility of network devices connected
to the system since the devices need not be connected
to each other.
•Accessing network devices from any location within
the network coverage or Wi-Fi hotspot becomes
convenient since laying out cables is not needed.
•Installation and setup of wireless networks are easier.
 Examples of wireless networks
 Mobile phone networks
 Wireless sensor networks
 Satellite communication networks
 Terrestrial microwave networks
Layers of OSI Model
 OSI stands for Open Systems Interconnection. It has been developed by ISO –
‘International Organization for Standardization‘, in the year 1984. It is a 7 layer
architecture with each layer having specific functionality to perform. All these 7 layers
work collaboratively to transmit the data from one person to another across the globe.
1. Physical Layer (Layer 1) :
 The lowest layer of the OSI reference model is the physical layer. It is
responsible for the actual physical connection between the devices. The physical
layer contains information in the form of bits. It is responsible for transmitting
individual bits from one node to the next.
 * Hub, Repeater, Modem, Cables are Physical Layer devices.
 Network Layer, Data Link Layer, and Physical Layer are also known as Lower
Layers or Hardware Layers.
2. Data Link Layer (DLL) (Layer 2)
 The data link layer is responsible for the node-to-node delivery of the message.
The main function of this layer is to make sure data transfer is error-free from
one node to another, over the physical layer. When a packet arrives in a
network, it is the responsibility of DLL to transmit it to the Host using its MAC
address.
 Data Link Layer is divided into two sublayers:
 Logical Link Control (LLC)
 Media Access Control (MAC)
 Packet in Data Link layer is referred to as Frame.
 ** Data Link layer is handled by the NIC (Network Interface Card) and device
drivers of host machines.
 *** Switch & Bridge are Data Link Layer devices
Network Layer (Layer 3) :
 The network layer works for the transmission of data from one host to the other
located in different networks. It also takes care of packet routing i.e. selection of
the shortest path to transmit the packet, from the number of routes available.
The sender & receiver’s IP addresses are placed in the header by the network
layer.
 Segment in Network layer is referred to as Packet.
 Network layer is implemented by networking devices such as routers.
Transport Layer (Layer 4) :
 The transport layer provides services to the application layer and takes services
from the network layer. The data in the transport layer is referred to
as Segments. It is responsible for the End to End Delivery of the complete
message. The transport layer also provides the acknowledgement of the
successful data transmission and re-transmits the data if an error is found.
 Note: The sender needs to know the port number associated with the receiver’s
application.
Session Layer (Layer 5) :
 This layer is responsible for the establishment of connection, maintenance of
sessions, authentication, and also ensures security.
 All the below 3 layers(including Session Layer) are integrated as a single layer in
the TCP/IP model as “Application Layer”.
 **Implementation of these 3 layers is done by the network application itself.
These are also known as Upper Layers or Software Layers.
Presentation Layer (Layer 6):
 The presentation layer is also called the Translation layer. The data from the
application layer is extracted here and manipulated as per the required format
to transmit over the network.
 The functions of the presentation layer are :
 Translation: For example, ASCII to EBCDIC.
 Encryption/ Decryption: Data encryption translates the data into another form
or code. The encrypted data is known as the ciphertext and the decrypted data
is known as plain text. A key value is used for encrypting as well as decrypting
data.
 Compression: Reduces the number of bits that need to be transmitted on the
network.
Application Layer (Layer 7) :
 At the very top of the OSI Reference Model stack of layers, we find the Application
layer which is implemented by the network applications. These applications produce
the data, which has to be transferred over the network. This layer also serves as a
window for the application services to access the network and for displaying the
received information to the user.
 Example: Application – Browsers, Skype Messenger, etc.
 **Application Layer is also called Desktop Layer.
 The functions of the Application layer are :
 Network Virtual Terminal
 FTAM-File transfer access and management
 Mail Services
 Directory Services
OSI model
OSI model acts as a reference model and is not implemented on the Internet
because of its late invention. The current model being used is the TCP/IP model.
Thanks For Watching

More Related Content

Similar to Computer Network ssss ppt.pptx

COMPUTER NETWORK seminar.pptx
COMPUTER NETWORK seminar.pptxCOMPUTER NETWORK seminar.pptx
COMPUTER NETWORK seminar.pptxnihareddy0302
 
Install network cable module CSS NC2
Install network cable module CSS NC2Install network cable module CSS NC2
Install network cable module CSS NC2wilfredo dela cerna
 
computer networks presentation
computer networks presentationcomputer networks presentation
computer networks presentationKrishi Agrawal
 
Classification of Computer
Classification of ComputerClassification of Computer
Classification of ComputerAfsanaAkterRubi
 
Types of computer networks
Types of computer networksTypes of computer networks
Types of computer networksTatheer Fatima
 
Cf presentation by muhammad saad salman
Cf presentation by muhammad saad salmanCf presentation by muhammad saad salman
Cf presentation by muhammad saad salmanMuhammad Saad Salman
 
Network ppt
Network pptNetwork ppt
Network ppthlalu861
 
Ccna(routing &and switching)
Ccna(routing &and switching)Ccna(routing &and switching)
Ccna(routing &and switching)Shweta Kumari
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And TelecommunicationsUMaine
 
Networking presentation
Networking presentationNetworking presentation
Networking presentationGajan Hai
 
Computer Networks
Computer NetworksComputer Networks
Computer NetworksRaj vardhan
 

Similar to Computer Network ssss ppt.pptx (20)

COMPUTER NETWORK seminar.pptx
COMPUTER NETWORK seminar.pptxCOMPUTER NETWORK seminar.pptx
COMPUTER NETWORK seminar.pptx
 
Install network cable module CSS NC2
Install network cable module CSS NC2Install network cable module CSS NC2
Install network cable module CSS NC2
 
Networking HMT-1
Networking HMT-1Networking HMT-1
Networking HMT-1
 
COMPUTER TAPALOGY
COMPUTER TAPALOGYCOMPUTER TAPALOGY
COMPUTER TAPALOGY
 
computer networks presentation
computer networks presentationcomputer networks presentation
computer networks presentation
 
Classification of Computer
Classification of ComputerClassification of Computer
Classification of Computer
 
Kinds of networks mee
Kinds of networks meeKinds of networks mee
Kinds of networks mee
 
Lan pan class 12 ppt
Lan pan class 12 pptLan pan class 12 ppt
Lan pan class 12 ppt
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Networking
NetworkingNetworking
Networking
 
Types of computer networks
Types of computer networksTypes of computer networks
Types of computer networks
 
NETWORKING
NETWORKINGNETWORKING
NETWORKING
 
Cf presentation by muhammad saad salman
Cf presentation by muhammad saad salmanCf presentation by muhammad saad salman
Cf presentation by muhammad saad salman
 
Network ppt
Network pptNetwork ppt
Network ppt
 
Ccna(routing &and switching)
Ccna(routing &and switching)Ccna(routing &and switching)
Ccna(routing &and switching)
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
 
Network -Lecture Notes
Network -Lecture NotesNetwork -Lecture Notes
Network -Lecture Notes
 
Networks
NetworksNetworks
Networks
 
Networking presentation
Networking presentationNetworking presentation
Networking presentation
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 

Recently uploaded

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Recently uploaded (20)

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

Computer Network ssss ppt.pptx

  • 1. Welcome to My PPT Presented by- Ram nivas sonkar
  • 2. TOPIC- INTRODUCTION TO COMPUTER NETWORKS CONTENT  INTRODUCTION  WHAT IS COMPUTER NETWORKS?  COMPONENTS OF COMPUTER NETWORKS  TYPES OF COMPUTER NETWORKS  ADVANTAGE AND DISADVANTAGES OF COMPUTER NETWORKS  NETWORK TOPOLOGY  WIRELESS NETWORK  WHAT IS OSI MODEL
  • 3. Introduction  Computer networks connect two or more Computer .  The computers can be geographical located anywhere .
  • 4. What is computer Network? Computer networking refers to interconnected computing devices that can exchange data and share resources with each other. These networked devices use a system of rules, called communications protocols, to transmit information over physical or wireless technologies.
  • 6. Type of computer network  A computer network is a group of computers linked to each other that enables the computer to communicate with another computer and share their resources, data, and applications.  A computer network can be categorized by their size. A computer network is mainly of four types:  LAN(Local Area Network)  MAN(Metropolitan Area Network)  WAN(Wide Area Network)  PAN(Personal Area Network)
  • 7. LAN(Local Area Network)  Local Area Network is a group of computers connected to each other in a small area such as building, office.  LAN is used for connecting two or more personal computers through a communication medium such as twisted pair, coaxial cable, etc.  It is less costly as it is built with inexpensive hardware such as hubs, network adapters, and ethernet cables.  The data is transferred at an extremely faster rate in Local Area Network.  Local Area Network provides higher security.
  • 8. MAN(Metropolitan Area Network)  A metropolitan area network is a network that covers a larger geographic area by interconnecting a different LAN to form a larger network.  Government agencies use MAN to connect to the citizens and private industries.  In MAN, various LANs are connected to each other through a telephone exchange line.  The most widely used protocols in MAN are RS-232, Frame Relay, ATM, ISDN, OC-3, ADSL, etc.  It has a higher range than Local Area Network(LAN).
  • 9. Uses Of Metropolitan Area Network: MAN is used in communication between the banks in a city. It can be used in an Airline Reservation. It can be used in a college within a city. It can also be used for communication in the military.
  • 10. WAN(Wide Area Network)  A Wide Area Network is a network that extends over a large geographical area such as states or countries.  A Wide Area Network is quite bigger network than the LAN.  A Wide Area Network is not limited to a single location, but it spans over a large geographical area through a telephone line, fibre optic cable or satellite links.  The internet is one of the biggest WAN in the world.  A Wide Area Network is widely used in the field of Business, government, and education.
  • 11. Examples Of Wide Area Network: Mobile Broadband: A 4G network is widely used across a region or country. Last mile: A telecom company is used to provide the internet services to the customers in hundreds of cities by connecting their home with fiber. Private network: A bank provides a private network that connects the 44 offices. This network is made by using the telephone leased line provided by the telecom company.
  • 12. Advantages Of Wide Area Network: Following are the advantages of the Wide Area Network:  Geographical area: A Wide Area Network provides a large geographical area. Suppose if the branch of our office is in a different city then we can connect with them through WAN. The internet provides a leased line through which we can connect with another branch.  Centralized data: In case of WAN network, data is centralized. Therefore, we do not need to buy the emails, files or back up servers.  Get updated files: Software companies work on the live server. Therefore, the programmers get the updated files within seconds.  Exchange messages: In a WAN network, messages are transmitted fast. The web application like Facebook, Whatsapp, Skype allows you to communicate with friends.  Sharing of software and resources: In WAN network, we can share the software and other resources like a hard drive, RAM.  Global business: We can do the business over the internet globally.  High bandwidth: If we use the leased lines for our company then this gives the high bandwidth. The high bandwidth increases the data transfer rate which in turn increases the productivity of our company.
  • 13. Disadvantages of Wide Area Network: The following are the disadvantages of the Wide Area Network:  Security issue: A WAN network has more security issues as compared to LAN and MAN network as all the technologies are combined together that creates the security problem.  Needs Firewall & antivirus software: The data is transferred on the internet which can be changed or hacked by the hackers, so the firewall needs to be used. Some people can inject the virus in our system so antivirus is needed to protect from such a virus.  High Setup cost: An installation cost of the WAN network is high as it involves the purchasing of routers, switches.  Troubleshooting problems: It covers a large area so fixing the problem is difficult.
  • 14. Network Topology Types of Network Topology  The arrangement of a network that comprises nodes and connecting lines via sender and receiver is referred to as network topology. The various network topologies are:  Mesh Topology  Star Topology  Bus Topology  Ring Topology  Tree Topology  Hybrid Topology
  • 15. Mesh Topology:  In a mesh topology, every device is connected to another device via a particular channel. In Mesh Topology, the protocols used are AHCP (Ad Hoc Configuration Protocols), DHCP (Dynamic Host Configuration Protocol), etc.  Every device is connected to another via dedicated channels. These channels are known as links.
  • 16. Advantages of this topology:  Communication is very fast between the nodes.  It is robust.  The fault is diagnosed easily. Data is reliable because data is transferred among the devices through dedicated channels or links.  Provides security and privacy. Disadvantaged of this topology: • Installation and configuration are difficult. • The cost of cables is high as bulk wiring is required, hence suitable for less number of devices. • The cost of maintenance is high.
  • 17. Star Topology:  In star topology, all the devices are connected to a single hub through a cable. This hub is the central node and all other nodes are connected to the central node. The hub can be passive in nature i.e., not an intelligent hub such as broadcasting devices, at the same time the hub can be intelligent known as an active hub. Active hubs have repeaters in them. Coaxial cables or RJ-45 cables are used to connect the computers. In Star Topology, many popular Ethernet LAN protocols are used as CD(Collision Detection), CSMA (Carrier Sense Multiple Access), etc. A star topology having four systems connected to a single point of connection i.e. hub.
  • 18. Advantages of this topology: If N devices are connected to each other in a star topology, then the number of cables required to connect them is N. So, it is easy to set up. Each device requires only 1 port i.e. to connect to the hub, therefore the total number of ports required is N. It is Robust. If one link fails only that link will affect and not other than that. Easy to fault identification and fault isolation. Star topology is cost-effective as it uses inexpensive coaxial cable. Disadvantage of this topology: •If the concentrator (hub) on which the whole topology relies fails, the whole system will crash down. •The cost of installation is high. •Performance is based on the single concentrator i.e. hub.
  • 19. Bus Topology:  Bus topology is a network type in which every computer and network device is connected to a single cable. It is bi- directional. It is a multi-point connection and a non-robust topology because if the backbone fails the topology crashes. In Bus Topology, various MAC (Media Access Control) protocols are followed by LAN ethernet connections like TDMA, Pure Aloha, CDMA, Slotted Aloha, etc A bus topology with shared backbone cable. The nodes are connected to the channel via drop lines.
  • 20. Advantages of this topology:  If N devices are connected to each other in a bus topology, then the number of cables required to connect them is 1, known as backbone cable, and N drop lines are required.  Coaxial or twisted pair cables are mainly used in bus-based networks that support up to 10 Mbps.  The cost of the cable is less compared to other topologies, but it is used to build small networks.  Bus topology is familiar technology as installation and troubleshooting techniques are well known. Problems with this topology: •A bus topology is quite simpler, but still, it requires a lot of cabling. •If the common cable fails, then the whole system will crash down. •If the network traffic is heavy, it increases collisions in the network. To avoid this, various protocols are used in the MAC layer known as Pure Aloha, Slotted Aloha, CSMA/CD, etc. •Adding new devices to the network would slow down networks. •Security is very low.
  • 21. Ring Topology:  In this topology, it forms a ring connecting devices with exactly two neighboring devices.  A number of repeaters are used for Ring topology with a large number of nodes, because if someone wants to send some data to the last node in the ring topology with 100 nodes, then the data will have to pass through 99 nodes to reach the 100th node. Hence to prevent data loss repeaters are used in the network.  The data flows in one direction, i.e.., it is unidirectional, but it can be made bidirectional by having 2 connections between each Network Node, it is called Dual Ring Topology. In-Ring Topology, the Token Ring Passing protocol is used by the workstations to transmit the data.
  • 22. A ring topology comprises 4 stations connected with each forming a ring. The most common access method of ring topology is token passing. The most common access method of ring topology is token passing. •Token passing: It is a network access method in which a token is passed from one node to another node. •Token: It is a frame that circulates around the network.
  • 23. Advantages of this topology:  The data transmission is high-speed.  The possibility of collision is minimum in this type of topology.  Cheap to install and expand.  It is less costly than a star topology Problems with this topology:  The failure of a single node in the network can cause the entire network to fail.  Troubleshooting is difficult in this topology.  The addition of stations in between or the removal of stations can disturb the whole topology.  Less secure.
  • 24. Tree Topology :  This topology is the variation of the Star topology. This topology has a hierarchical flow of data. In Tree Topology, protocols like DHCP and SAC (Standard Automatic Configuration ) are used. In this, the various secondary hubs are connected to the central hub which contains the repeater. This data flow from top to bottom i.e. from the central hub to the secondary and then to the devices or from bottom to top i.e. devices to the secondary hub and then to the central hub. It is a multi-point connection and a non-robust topology because if the backbone fails the topology crashes.
  • 25.  Advantages of this topology :  It allows more devices to be attached to a single central hub thus it decreases the distance that is traveled by the signal to come to the devices.  It allows the network to get isolated and also prioritize from different computers.  We can add new devices to the existing network.  Error detection and error correction are very easy in a tree topology.  Problems with this topology :  If the central hub gets fails the entire system fails.  The cost is high because of the cabling.  If new devices are added, it becomes difficult to reconfigure.
  • 26. Hybrid Topology :  This topological technology is the combination of all the various types of topologies we have studied above. It is used when the nodes are free to take any form. It means these can be individuals such as Ring or Star topology or can be a combination of various types of topologies seen above. Each individual topology uses the protocol that has been discussed earlier. figure shows the structure of the Hybrid topology. As seen it contains a combination of all different types of networks.
  • 27.  Advantages of this topology :  This topology is very flexible.  The size of the network can be easily expanded by adding new devices.  Problems with this topology :  It is challenging to design the architecture of the Hybrid Network.  Hubs used in this topology are very expensive.  The infrastructure cost is very high as a hybrid network requires a lot of cabling and network devices.
  • 28. Wireless Networks Computer networks that are not connected by cables are called wireless networks. They generally use radio waves for communication between the network nodes. They allow devices to be connected to the network while roaming around within the network coverage.
  • 29. Types of Wireless Networks  Wireless LANs − Connects two or more network devices using wireless distribution techniques.  Wireless MANs − Connects two or more wireless LANs spreading over a metropolitan area.  Wireless WANs − Connects large areas comprising LANs, MANs and personal networks. Advantages of Wireless Networks: •It provides clutter-free desks due to the absence of wires and cables. •It increases the mobility of network devices connected to the system since the devices need not be connected to each other. •Accessing network devices from any location within the network coverage or Wi-Fi hotspot becomes convenient since laying out cables is not needed. •Installation and setup of wireless networks are easier.
  • 30.  Examples of wireless networks  Mobile phone networks  Wireless sensor networks  Satellite communication networks  Terrestrial microwave networks
  • 31. Layers of OSI Model  OSI stands for Open Systems Interconnection. It has been developed by ISO – ‘International Organization for Standardization‘, in the year 1984. It is a 7 layer architecture with each layer having specific functionality to perform. All these 7 layers work collaboratively to transmit the data from one person to another across the globe.
  • 32. 1. Physical Layer (Layer 1) :  The lowest layer of the OSI reference model is the physical layer. It is responsible for the actual physical connection between the devices. The physical layer contains information in the form of bits. It is responsible for transmitting individual bits from one node to the next.  * Hub, Repeater, Modem, Cables are Physical Layer devices.  Network Layer, Data Link Layer, and Physical Layer are also known as Lower Layers or Hardware Layers.
  • 33. 2. Data Link Layer (DLL) (Layer 2)  The data link layer is responsible for the node-to-node delivery of the message. The main function of this layer is to make sure data transfer is error-free from one node to another, over the physical layer. When a packet arrives in a network, it is the responsibility of DLL to transmit it to the Host using its MAC address.  Data Link Layer is divided into two sublayers:  Logical Link Control (LLC)  Media Access Control (MAC)  Packet in Data Link layer is referred to as Frame.  ** Data Link layer is handled by the NIC (Network Interface Card) and device drivers of host machines.  *** Switch & Bridge are Data Link Layer devices
  • 34. Network Layer (Layer 3) :  The network layer works for the transmission of data from one host to the other located in different networks. It also takes care of packet routing i.e. selection of the shortest path to transmit the packet, from the number of routes available. The sender & receiver’s IP addresses are placed in the header by the network layer.  Segment in Network layer is referred to as Packet.  Network layer is implemented by networking devices such as routers.
  • 35. Transport Layer (Layer 4) :  The transport layer provides services to the application layer and takes services from the network layer. The data in the transport layer is referred to as Segments. It is responsible for the End to End Delivery of the complete message. The transport layer also provides the acknowledgement of the successful data transmission and re-transmits the data if an error is found.  Note: The sender needs to know the port number associated with the receiver’s application.
  • 36. Session Layer (Layer 5) :  This layer is responsible for the establishment of connection, maintenance of sessions, authentication, and also ensures security.  All the below 3 layers(including Session Layer) are integrated as a single layer in the TCP/IP model as “Application Layer”.  **Implementation of these 3 layers is done by the network application itself. These are also known as Upper Layers or Software Layers.
  • 37. Presentation Layer (Layer 6):  The presentation layer is also called the Translation layer. The data from the application layer is extracted here and manipulated as per the required format to transmit over the network.  The functions of the presentation layer are :  Translation: For example, ASCII to EBCDIC.  Encryption/ Decryption: Data encryption translates the data into another form or code. The encrypted data is known as the ciphertext and the decrypted data is known as plain text. A key value is used for encrypting as well as decrypting data.  Compression: Reduces the number of bits that need to be transmitted on the network.
  • 38. Application Layer (Layer 7) :  At the very top of the OSI Reference Model stack of layers, we find the Application layer which is implemented by the network applications. These applications produce the data, which has to be transferred over the network. This layer also serves as a window for the application services to access the network and for displaying the received information to the user.  Example: Application – Browsers, Skype Messenger, etc.  **Application Layer is also called Desktop Layer.  The functions of the Application layer are :  Network Virtual Terminal  FTAM-File transfer access and management  Mail Services  Directory Services
  • 39. OSI model OSI model acts as a reference model and is not implemented on the Internet because of its late invention. The current model being used is the TCP/IP model.