SlideShare a Scribd company logo
1 of 21
DepEd ETUlay DepEd ETUlay
DepEd ETUlay DepEd ETUlay
Computer System
Servicing G11
Q3 Week 1 : Basic Concepts of Networking
Quarter 3 Week 1
LO 1 Install network cables
Code: TLE_IACSS9-12SUCN-Iva-j-33
At the end of our tutorial, you are expected to;
• Understands the basic concepts in computer
network technology
• Identify the different types of network
INTRODUCTION
A computer network is a group of
computer that shares information
or data that linked together in the
same communication medium.
www.facebook.com/itsmeismael
Local area network
A Local area network (LAN), or, in
other words, small network
constrained to a small geographic
area. An example of a LAN would
be a computer network within a
building.
www.facebook.com/itsmeismael
Personal area network
A Personal Area Network (PAN) is a
computer network used for
communication among computer
devices, including smartphone and
tablet, in proximity to an
individual's body.
www.facebook.com/itsmeismael
Wide area network
A wide area network (WAN) is a
computer network that covers a
broad area (i.e., any network whose
communications links cross
metropolitan, regional, or national
boundaries).
The largest WAN in existence is the
Internet.
www.facebook.com/itsmeismael
Metropolitan area network
A metropolitan area network
(MAN) is a hybrid between a LAN
and a WAN. Like a WAN, it
connects two or more LANs in the
same geographic area.
www.facebook.com/itsmeismael
Storage area network
A storage area network (SAN) is a
dedicated storage network that
provides access to consolidated,
block level storage. SANs are used
primarily to make storage devices
(such as disk arrays) accessible to
servers so that the devices appear
as locally attached to the operating
system.
www.facebook.com/itsmeismael
The Internet
It is a network of networks that
consists of millions of
interconnected devices, that are
linked by a broad array of
electronic, wireless and optical
networking technologies.
www.facebook.com/itsmeismael
Virtual Private Network
A VPN is a private network that is constructed within a public network infrastructure
such as the global Internet. a telecommuter can access the network of the company
headquarters through the Internet by building a secure tunnel between the
telecommuter’s PC and a VPN router in the headquarters. It is a mechanism for
providing secure, reliable transport over Internet. VPNs are frequently used by
remote workers or companies with remote offices to share private data and network
resources.
www.facebook.com/itsmeismael
Server-Based Network
The term Client/server refers to the concept of
sharing the work involved in processing data
between the client computer and the server
computer.
The client/server network is the most efficient
way to provide:
Databases and management of applications
such as Spreadsheets, Accounting,
Communications and Document
management.
Network management.
Centralized file storage
www.facebook.com/itsmeismael
Peer to peer network
There are no dedicated servers or hierarchy
among the computers.
All of the computers are equal and therefore
known as peers.
In peer-to-peer (P2P) networks, each computer
acts as both a server and a client. Examples of
P2P software include Skype and BitTorrent.
www.facebook.com/itsmeismael
QUIZ TIME
The largest WAN in existence is the
Internet.
A. TRUE B. FALSE
In peer-to-peer (P2P) networks, each
computer acts as both a server and a
client.
A. TRUE B. FALSE
Local area network (LAN), or, in other
words, small network constrained to a
small geographic area.
A. TRUE B. FALSE
DepEd ETUlay DepEd ETUlay
THANK YOU!
Up Next : Tutor Lon
Computer System Servicing G12

More Related Content

Similar to Basic-Concepts-in-Computer-Networks.pptx

Data Communication & Computer Network
Data Communication & Computer Network Data Communication & Computer Network
Data Communication & Computer Network Faraz Ahmed
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorialajaymane22
 
Class viii ch-1 networking concepts
Class  viii ch-1 networking conceptsClass  viii ch-1 networking concepts
Class viii ch-1 networking conceptsjessandy
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkammulu99
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorialRodel Morales
 
Networking Basics - Ferdon
Networking Basics - FerdonNetworking Basics - Ferdon
Networking Basics - FerdonSusan Ferdon
 
541ferdon networktutorial
541ferdon networktutorial541ferdon networktutorial
541ferdon networktutorialSusan Ferdon
 
Mis 2nd assignment final solved
Mis 2nd assignment final solvedMis 2nd assignment final solved
Mis 2nd assignment final solvedDanish Saqi
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorialreddydivakara
 
Computer-Networks-PPT.pptx
Computer-Networks-PPT.pptxComputer-Networks-PPT.pptx
Computer-Networks-PPT.pptxDebaComedyClub
 
20221206084441_638f00f9abf2b_computer_networks_ppt.pptx
20221206084441_638f00f9abf2b_computer_networks_ppt.pptx20221206084441_638f00f9abf2b_computer_networks_ppt.pptx
20221206084441_638f00f9abf2b_computer_networks_ppt.pptxActionForyou
 
Bab3-computer network
Bab3-computer networkBab3-computer network
Bab3-computer networkAten Kecik
 
Seminar report-networking
Seminar report-networkingSeminar report-networking
Seminar report-networkingJyoti Kumari
 

Similar to Basic-Concepts-in-Computer-Networks.pptx (20)

Data Communication & Computer Network
Data Communication & Computer Network Data Communication & Computer Network
Data Communication & Computer Network
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorial
 
Basic lecture
Basic lectureBasic lecture
Basic lecture
 
Class viii ch-1 networking concepts
Class  viii ch-1 networking conceptsClass  viii ch-1 networking concepts
Class viii ch-1 networking concepts
 
Networking
NetworkingNetworking
Networking
 
Cn
CnCn
Cn
 
Cnetworks
CnetworksCnetworks
Cnetworks
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of network
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
network
networknetwork
network
 
Networking Basics - Ferdon
Networking Basics - FerdonNetworking Basics - Ferdon
Networking Basics - Ferdon
 
541ferdon networktutorial
541ferdon networktutorial541ferdon networktutorial
541ferdon networktutorial
 
Bab3
Bab3Bab3
Bab3
 
Mis 2nd assignment final solved
Mis 2nd assignment final solvedMis 2nd assignment final solved
Mis 2nd assignment final solved
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
Types of network
Types of networkTypes of network
Types of network
 
Computer-Networks-PPT.pptx
Computer-Networks-PPT.pptxComputer-Networks-PPT.pptx
Computer-Networks-PPT.pptx
 
20221206084441_638f00f9abf2b_computer_networks_ppt.pptx
20221206084441_638f00f9abf2b_computer_networks_ppt.pptx20221206084441_638f00f9abf2b_computer_networks_ppt.pptx
20221206084441_638f00f9abf2b_computer_networks_ppt.pptx
 
Bab3-computer network
Bab3-computer networkBab3-computer network
Bab3-computer network
 
Seminar report-networking
Seminar report-networkingSeminar report-networking
Seminar report-networking
 

More from DepEd-Bataan

Tools and Equipment used in CSS NCII
Tools and Equipment used in CSS NCIITools and Equipment used in CSS NCII
Tools and Equipment used in CSS NCIIDepEd-Bataan
 
ICT Projects for Social Awareness
ICT Projects for Social AwarenessICT Projects for Social Awareness
ICT Projects for Social AwarenessDepEd-Bataan
 
ICT and Social Responsibility
ICT and Social ResponsibilityICT and Social Responsibility
ICT and Social ResponsibilityDepEd-Bataan
 
Testing strategies for electronic components
Testing strategies for electronic componentsTesting strategies for electronic components
Testing strategies for electronic componentsDepEd-Bataan
 
Different methods in testing an electronic components
Different methods in testing an electronic componentsDifferent methods in testing an electronic components
Different methods in testing an electronic componentsDepEd-Bataan
 
Introduction to MIL: Media, Information and Technology Literacy
Introduction to MIL: Media, Information and Technology Literacy Introduction to MIL: Media, Information and Technology Literacy
Introduction to MIL: Media, Information and Technology Literacy DepEd-Bataan
 
At a Glace on Renewable Energy (June 2014)
At a Glace on Renewable Energy (June 2014)At a Glace on Renewable Energy (June 2014)
At a Glace on Renewable Energy (June 2014)DepEd-Bataan
 

More from DepEd-Bataan (7)

Tools and Equipment used in CSS NCII
Tools and Equipment used in CSS NCIITools and Equipment used in CSS NCII
Tools and Equipment used in CSS NCII
 
ICT Projects for Social Awareness
ICT Projects for Social AwarenessICT Projects for Social Awareness
ICT Projects for Social Awareness
 
ICT and Social Responsibility
ICT and Social ResponsibilityICT and Social Responsibility
ICT and Social Responsibility
 
Testing strategies for electronic components
Testing strategies for electronic componentsTesting strategies for electronic components
Testing strategies for electronic components
 
Different methods in testing an electronic components
Different methods in testing an electronic componentsDifferent methods in testing an electronic components
Different methods in testing an electronic components
 
Introduction to MIL: Media, Information and Technology Literacy
Introduction to MIL: Media, Information and Technology Literacy Introduction to MIL: Media, Information and Technology Literacy
Introduction to MIL: Media, Information and Technology Literacy
 
At a Glace on Renewable Energy (June 2014)
At a Glace on Renewable Energy (June 2014)At a Glace on Renewable Energy (June 2014)
At a Glace on Renewable Energy (June 2014)
 

Recently uploaded

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Basic-Concepts-in-Computer-Networks.pptx

  • 2. DepEd ETUlay DepEd ETUlay Computer System Servicing G11 Q3 Week 1 : Basic Concepts of Networking
  • 3.
  • 4. Quarter 3 Week 1 LO 1 Install network cables Code: TLE_IACSS9-12SUCN-Iva-j-33 At the end of our tutorial, you are expected to; • Understands the basic concepts in computer network technology • Identify the different types of network
  • 5. INTRODUCTION A computer network is a group of computer that shares information or data that linked together in the same communication medium. www.facebook.com/itsmeismael
  • 6. Local area network A Local area network (LAN), or, in other words, small network constrained to a small geographic area. An example of a LAN would be a computer network within a building. www.facebook.com/itsmeismael
  • 7. Personal area network A Personal Area Network (PAN) is a computer network used for communication among computer devices, including smartphone and tablet, in proximity to an individual's body. www.facebook.com/itsmeismael
  • 8. Wide area network A wide area network (WAN) is a computer network that covers a broad area (i.e., any network whose communications links cross metropolitan, regional, or national boundaries). The largest WAN in existence is the Internet. www.facebook.com/itsmeismael
  • 9. Metropolitan area network A metropolitan area network (MAN) is a hybrid between a LAN and a WAN. Like a WAN, it connects two or more LANs in the same geographic area. www.facebook.com/itsmeismael
  • 10. Storage area network A storage area network (SAN) is a dedicated storage network that provides access to consolidated, block level storage. SANs are used primarily to make storage devices (such as disk arrays) accessible to servers so that the devices appear as locally attached to the operating system. www.facebook.com/itsmeismael
  • 11. The Internet It is a network of networks that consists of millions of interconnected devices, that are linked by a broad array of electronic, wireless and optical networking technologies. www.facebook.com/itsmeismael
  • 12. Virtual Private Network A VPN is a private network that is constructed within a public network infrastructure such as the global Internet. a telecommuter can access the network of the company headquarters through the Internet by building a secure tunnel between the telecommuter’s PC and a VPN router in the headquarters. It is a mechanism for providing secure, reliable transport over Internet. VPNs are frequently used by remote workers or companies with remote offices to share private data and network resources. www.facebook.com/itsmeismael
  • 13. Server-Based Network The term Client/server refers to the concept of sharing the work involved in processing data between the client computer and the server computer. The client/server network is the most efficient way to provide: Databases and management of applications such as Spreadsheets, Accounting, Communications and Document management. Network management. Centralized file storage www.facebook.com/itsmeismael
  • 14. Peer to peer network There are no dedicated servers or hierarchy among the computers. All of the computers are equal and therefore known as peers. In peer-to-peer (P2P) networks, each computer acts as both a server and a client. Examples of P2P software include Skype and BitTorrent. www.facebook.com/itsmeismael
  • 16. The largest WAN in existence is the Internet. A. TRUE B. FALSE
  • 17. In peer-to-peer (P2P) networks, each computer acts as both a server and a client. A. TRUE B. FALSE
  • 18. Local area network (LAN), or, in other words, small network constrained to a small geographic area. A. TRUE B. FALSE
  • 19.
  • 20.
  • 21. DepEd ETUlay DepEd ETUlay THANK YOU! Up Next : Tutor Lon Computer System Servicing G12