The document provides an introduction to computer networks, including:
- ARPANET was the first network established by the US Department of Defense in the 1960s to connect research institutions over telephone lines.
- Key milestones include the development of email in 1972 and the introduction of TCP/IP as the standard protocol in 1982.
- Computer networks allow for resource sharing, high reliability, and flexible access across connected devices through hardware like routers and switches, transmission media, and network protocols.
Types of Networks
There are several different types of computer networks. Computer networks can be characterized by their size as well as their purpose.
The size of a network can be expressed by the geographic area they occupy and the number of computers that are part of the network. Networks can cover anything from a handful of devices within a single room to millions of devices spread across the entire globe.
Some of the different networks based on size are:
Personal area network, or PAN
Local area network, or LAN
Metropolitan area network, or MAN
Wide area network, or WAN
This Slide includes:
1. Meaning of Network
2. Importance Of Network
3. Types of Network
3.1. On the basis of Topology.
3.1.1. Structured Topology
3.1.2. Unstructured Topology
3.2. On the basis of Architecture.
3.2.1. Peer-To-Peer Network.
3.2.2. Server-based Network.
3.3. On the basis of Geographical Area
3.3.1. Local Area Network (LAN).
3.3.2. Wide Area Network (WAN).
3.3.3. Metropolitan Area Network (MAN).
3.3.4. Virtual Private Network (VPN).
3.3.5. Storage Area Network (SAN).
3.3.6. Value Added Network (VAN).
- Uttar Tamang
network internet
TYPES OF NETWORK
There are two main types of network:
• LAN
• WAN
NETWORK TOPOLOGY
TYPES OF TOPOLOGY
1. BUS
2. STAR
3. RING
RING TOPOLOGY
INTERNET
HISTORY OF INTERNET
CONNECTING METHODS TO THE INTERNET
To connect to the Internet the following are needed:
• a computer
• telephone line
• modem and/or router
• an ISP (Internet Service Provider)
• Web browser, e.g. Internet Explorer, Fire fox, Chrome, Safari, Opera etc.
Web application security is the process of protecting websites and online services against different security threats that exploit vulnerabilities in an application’s code . Common targets for web application attacks are content management systems Web application security is important to any business as it helps to keep web applications functioning smoothly and protect businesses from cyber vandalism, data theft, unethical competition, and other negative consequences . Web applications may face a number of attack types depending on the attacker’s goals, the nature of the targeted organization’s work. A web application (web app) is an application program that is stored on a remote server and delivered over the internet through a browser interface. Web services are web apps by definition and many, although not all, websites contain web apps.
Types of Networks
There are several different types of computer networks. Computer networks can be characterized by their size as well as their purpose.
The size of a network can be expressed by the geographic area they occupy and the number of computers that are part of the network. Networks can cover anything from a handful of devices within a single room to millions of devices spread across the entire globe.
Some of the different networks based on size are:
Personal area network, or PAN
Local area network, or LAN
Metropolitan area network, or MAN
Wide area network, or WAN
This Slide includes:
1. Meaning of Network
2. Importance Of Network
3. Types of Network
3.1. On the basis of Topology.
3.1.1. Structured Topology
3.1.2. Unstructured Topology
3.2. On the basis of Architecture.
3.2.1. Peer-To-Peer Network.
3.2.2. Server-based Network.
3.3. On the basis of Geographical Area
3.3.1. Local Area Network (LAN).
3.3.2. Wide Area Network (WAN).
3.3.3. Metropolitan Area Network (MAN).
3.3.4. Virtual Private Network (VPN).
3.3.5. Storage Area Network (SAN).
3.3.6. Value Added Network (VAN).
- Uttar Tamang
network internet
TYPES OF NETWORK
There are two main types of network:
• LAN
• WAN
NETWORK TOPOLOGY
TYPES OF TOPOLOGY
1. BUS
2. STAR
3. RING
RING TOPOLOGY
INTERNET
HISTORY OF INTERNET
CONNECTING METHODS TO THE INTERNET
To connect to the Internet the following are needed:
• a computer
• telephone line
• modem and/or router
• an ISP (Internet Service Provider)
• Web browser, e.g. Internet Explorer, Fire fox, Chrome, Safari, Opera etc.
Web application security is the process of protecting websites and online services against different security threats that exploit vulnerabilities in an application’s code . Common targets for web application attacks are content management systems Web application security is important to any business as it helps to keep web applications functioning smoothly and protect businesses from cyber vandalism, data theft, unethical competition, and other negative consequences . Web applications may face a number of attack types depending on the attacker’s goals, the nature of the targeted organization’s work. A web application (web app) is an application program that is stored on a remote server and delivered over the internet through a browser interface. Web services are web apps by definition and many, although not all, websites contain web apps.
"This presentation was created through wide-ranged research and is intended specially for everyone interested in network technology".
-BRIAN S. CUNAL
KALINGA-APAYAO STATE COLLEGE
IT Instructor.
Illustrate this Basic concept of Computer networks and
distributed systems, Goals of networking, General approaches of communication within a network, Network classification, Uses & Network Software
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
1. Introduction to Computer Networks
Basic concept of Computer networks
Md. Asifur Rahman Siddiki
ID: 1834902563
Batch: 49
2. ARPANET
Advanced Research Projects Agency Network − the granddad of Internet was a network
established by the US Department of Defense (DOD). The work for establishing the
network started in the early 1960s and DOD sponsored major research work, which
resulted in development on initial protocols, languages and frameworks for network
communication. Defense department, funded the development of the Advanced Research
Projects Agency Network (ARPANET). Its initial purpose was to link computers at
Pentagon-funded research institutions over telephone lines.
It had four nodes at University of California at Los Angeles (UCLA), Stanford Research
Institute (SRI), University of California at Santa Barbara (UCSB) and University of Utah.
On October 29, 1969, the first message was exchanged between UCLA and SRI. E-mail
was created by Roy Tomlinson in 1972 at Bolt Beranek and Newman, Inc. (BBN) after
UCLA was connected to BBN.
3. Year Milestone
1957 Advanced Research Project Agency formed by US
1969 ARPANET became functional
1970 ARPANET connected to BBNs
1972
Roy Tomlinson develops network messaging or E-mail. Symbol @
comes to mean "at"
1973 APRANET connected to Royal Radar Network of Norway
1974
Term Internet coined
First commercial use of ARPANET, Telenet is approved
1982 TCP/IP introduced as standard protocol on ARPANET
1983 Domain Name System introduced
1986
National Science Foundation brings connectivity to more people
with its NSFNET program
1990
ARPANET decommissioned. First web browser Nexus developed.
HTML developed
2002-2004 Web 2.0 is born
4. Computer Network
Computer networks are the basis of communication in IT. A computer network is an
interconnection of multiple devices, also known as hosts that are connected using multiple
paths for the purpose of sending/receiving data or media. In short we can say that “A
computer network is a group of two or more interconnected computer systems”. We can
establish a network connection using either cable or wireless media. Every network
involves hardware and software that connects computers and tools.
Goals of Computer Network
The main goals of computer networks are as follows –
Resource Sharing
The main goal of the computer network is Resource Sharing. It is to create all the
programs, data and hardware accessible to anyone on the network without considering the
resource’s physical area and the client.
Performance
It is measured in terms of transit time and response time.
Transit time is the time for a message to travel from one device to another
Response time is the elapsed time between an inquiry and a response.
Performance is dependent on the following factors:
The number of users
Type of transmission medium
Capability of connected network
Efficiency of software
5. High Reliability
The third goal is to support high reliability by acquiring a different authority of supply.
For example, all files can be recreated on a few machines, and thus if one of them is
nonexistent, the additional copies could be available.
Flexible access
Files can be accessed from any computer in the network. The project can be begun on one
computer and finished on another.
Other goals include Distribution of processing functions, Centralized management, and
allocation of network resources, Compatibility of dissimilar equipment and software,
Good network performance, Scalability, Saving money, Access to remote information,
Person to person communication etc.
Application of Computer Network
There are many applications of computer network. Some of them given below:
Business Applications
Resource Sharing:
The goal is to make all programs, equipment’s (like printers), and especially data,
available to anyone on the network without regard to the physical location of the
resource and the user.
Server-Client model:
One can imagine a company's information system as consisting of one or more
databases and some employees who need to access it remotely. In this model, the
data is stored on powerful computers called Servers. Often these are centrally
housed and maintained by a system administrator. In contrast, the employees have
simple machines, called Clients, on their desks, using which they access remote
data.
E-Commerce:
A goal that is starting to become more important in businesses is doing business
with consumers over the Internet. Airlines, bookstores and music vendors have
discovered that many customers like the convenience of shopping from home. This
sector is expected to grow quickly in the future.
6. Mobile Users
Mobile, computers such as notebook computers and Mobile phones, is one of the fastest-
growing segment of the entire computer industry. Although wireless networking and
mobile computing are often related.
Home Applications
Some of the most important uses of the Internet for home users are as follows:
Access to remote information
Person-to-person communication
Interactive entertainment
Network Hardware & Software
There are three component of Computer Network.
7. 1. Hardware Equipment
Network Interface Card- Network Interface card sends, receives data, and controls
data flow between the computer and the network.
Servers− Servers are high-configuration computers that manage the resources of
the network. The network operating system is typically installed in the server and so
they give user accesses to the network resources. Servers can be of various kinds:
file servers, database servers, print servers etc.
Clients − Clients are computers that request and receive service from the servers to
access and use the network resources.
Peers − Peers are computers that provide as well as receive services from other
peers in a workgroup network.
8. Transmission Media − Transmission media are the channels through which data is
transferred from one device to another in a network. Transmission media may be
guided media like coaxial cable, fibre optic cables etc; or maybe unguided media
like microwaves, infra-red waves etc.
Connecting Devices − Connecting devices act as middleware between networks or
computers, by binding the network media together. Some of the common
connecting devices are:
a. Routers:
Routers help you to connect with multiple networks. It enables you to share a single
internet connection with multiple devices and saves money. This networking
component acts as a dispatcher, which allows you to analyze data sent across a
network. It automatically selects the best route for data to travel and send it on its
way.
9. b. Switch:
Switches work as a controller which connects computers, printers, and other
hardware devices to a network in a campus or a building. It allows devices on your
network to communicate with each other, as well as with other networks. It helps
you to share resources and reduce the costing of any organization.
c. Hubs:
Hub is a device that splits network connection into multiple computers. It acts a
distribution center so whenever a computer requests any information from a
computer or from the network it sends the request to the hub through a cable. The
hub will receive the request and transmit it to the entire network.
d. Bridges:
A network bridge is a computer networking device that creates a single,
aggregate network from multiple communication networks or network segments.
This function is called network bridging. Bridging is distinct from routing.
10. e. Repeaters:
A repeater is an electronic device in a communication channel that increases the
power of a signal and retransmits it, allowing it to travel further. Since it amplifies
the signal, it requires a source of electric power.
f. Gateways:
A gateway is a hardware device that acts as a "gate" between two networks. It may
be a router, firewall, server, or other device that enables traffic to flow in and out of
the network. While a gateway protects the nodes within network, it also a node
itself. A router is a common type of gateway used in home networks
2. Software:
Networking Operating System − Network Operating Systems is typically installed
in the server and facilitate workstations in a network to share files, database,
applications, printers etc.
Protocol Suite − A protocol is a rule or guideline followed by each computer for
data communication. Protocol suite is a set of related protocols that are laid down
for computer networks. The two popular protocol suites are −
a. OSI Model (Open System Interconnections):
11. OSI stands for Open Systems Interconnection. It is a reference model that
specifies standards for communications protocols and also the functionalities
of each layer.
b. TCP / IP Model:
TCP/IP, or Transmission Control Protocol/Internet Protocol, is a suite of
communication protocals used to interconnect network devices on the
internet. TCP/IP can also be used as a communications protocol in a private
computer network (an intranet or extranet).
IP (Internet Protocol) address is as a unique identifier for each device on the
Internet. Length of the IP address is 32-bits. IPv6 address is 64 bits.
3. Cables and Connectors:
Twisted-pair cables:
The twisted-pair cable was primarily developed for computer networks. This cable is also
known as Ethernet cable. Almost all modern LAN computer networks use this cable.
This cable consists of color-coded pairs of insulated copper wires. Every two wires are
twisted around each other to form pair. Usually, there are four pairs. Each pair has one
solid color and one stripped color wire. Solid colors are blue, brown, green, and orange. In
stripped color, the solid color is mixed with the white color.
12. Coaxial cable:
This cable contains a conductor, insulator, braiding, and sheath. The sheath covers the
braiding, the braiding covers the insulation, and the insulation covers the conductor.
Fiber optic cable:
This cable consists of a core, cladding, buffer, and jacket. The core is made from thin
strands of glass or plastic that can carry data over a long distance. The core is wrapped in
the cladding; the cladding is wrapped in the buffer, and the buffer is wrapped in the jacket.
Fiber optic cable is completely immune to EMI and RFI. This cable can transmit data over
a long distance at the highest speed. It can transmit data up to 40 kilometers at the speed of
100Gbps.
13. Unshielded Twisted Pair Connector
The standard connector for unshielded twisted pair cabling is an RJ-45 connector. This is a
plastic connector that looks like a large telephone-style connector . A slot allows the RJ-45
to be inserted only one way. RJ stands for Registered Jack, implying that the connector
follows a standard borrowed from the telephone industry. This standard designates which
wire goes with each pin inside the connector.
An image of RJ45