SlideShare a Scribd company logo
Basics of  Telecommunications  and Networking
Lecture Plan ,[object Object],[object Object],[object Object],[object Object]
Networking  ,[object Object],[object Object],[object Object],[object Object]
Classification of Network ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],Local Area Networks
[object Object],[object Object],[object Object],Wide Area Networks
Wide Area Networks
Metropolitan Area Networks ,[object Object],[object Object],[object Object]
[object Object],Personal Area Networks
You  may  be  connected  through: ,[object Object],[object Object],[object Object],[object Object]
What is Internet? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet: An Illustration
Internet Media Finance Computers Real Estate Education Health Government Universities Business Server User Client Model  of  Internet  Setup
Email application Client Server Client Email client sends message to server Message is stored on POP server Later, recipient’s email client retrieves message from  server
Internet ,[object Object],[object Object],[object Object]
Intranet ,[object Object],[object Object]
Extranet ,[object Object]
To summarize Yes Business partners Extranet Yes Employees & Managers Intranet No Anyone Internet Need of user id and password Users Type
Virtual Private Network ,[object Object],[object Object]
VPN - Layout Tunnel ISP ISP Firewall (data Encoded) Firewall (data Encoded) Sending Computer Receiving Computer
Computer Network topology ,[object Object],[object Object]
Computer Networks ,[object Object],[object Object],[object Object]
Local Area Networks-  3 basic  topologies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A  Star  topology connects all the nodes directly to the server or to a connecting device such as a  hub .
All nodes on a  Bus  topology are connected to a central line or backbone.
Nodes on a  Ring  topology are connected in a closed loop.  This means that each node has two connections, one in and another out.  Using this type of topology the data must travel through all the nodes.
Thank You…. Help is available !

More Related Content

What's hot

Chapter 1 introduction to computer networks
Chapter 1 introduction to computer networksChapter 1 introduction to computer networks
Chapter 1 introduction to computer networks
Viku1985
 
[Question Paper] Object Oriented Programming With C++ (Revised Course) [April...
[Question Paper] Object Oriented Programming With C++ (Revised Course) [April...[Question Paper] Object Oriented Programming With C++ (Revised Course) [April...
[Question Paper] Object Oriented Programming With C++ (Revised Course) [April...
Mumbai B.Sc.IT Study
 
Computer communication and networks
Computer communication and networksComputer communication and networks
Computer communication and networks
Imran Khan
 
Merge sort and quick sort
Merge sort and quick sortMerge sort and quick sort
Merge sort and quick sort
Shakila Mahjabin
 
Database Relationships
Database RelationshipsDatabase Relationships
Database Relationships
wmassie
 
Ppt of types of-network
Ppt of types of-network Ppt of types of-network
Ppt of types of-network
Darshit narechania
 
Data structure lecture 1
Data structure lecture 1Data structure lecture 1
Data structure lecture 1
Kumar
 
networking
networkingnetworking
networking
Pooja Dhiman
 
Unit II - 3 - Operating System - Process Synchronization
Unit II - 3 - Operating System - Process SynchronizationUnit II - 3 - Operating System - Process Synchronization
Unit II - 3 - Operating System - Process Synchronization
cscarcas
 
Parallel computing and its applications
Parallel computing and its applicationsParallel computing and its applications
Parallel computing and its applications
Burhan Ahmed
 
Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)
Zakaria Hossain
 
Selection sorting
Selection sortingSelection sorting
Selection sorting
Himanshu Kesharwani
 
Network topology
Network topologyNetwork topology
Network topology
Shubham Agrawal
 
Types of network
Types of networkTypes of network
Types of network
ishjari
 
Ch1 language design issue
Ch1 language design issueCh1 language design issue
Ch1 language design issue
Jigisha Pandya
 
Operating Systems - memory management
Operating Systems - memory managementOperating Systems - memory management
Operating Systems - memory management
Mukesh Chinta
 
Lecture #5 Data Communication and Network
Lecture #5 Data Communication and NetworkLecture #5 Data Communication and Network
Lecture #5 Data Communication and Network
vasanthimuniasamy
 
Introduction to IoT - Unit I
Introduction to IoT - Unit IIntroduction to IoT - Unit I
Introduction to IoT - Unit I
Dr.M.Karthika parthasarathy
 
Database Management System Introduction
Database Management System IntroductionDatabase Management System Introduction
Database Management System Introduction
Smriti Jain
 
Lecture 1 data structures and algorithms
Lecture 1 data structures and algorithmsLecture 1 data structures and algorithms
Lecture 1 data structures and algorithms
Aakash deep Singhal
 

What's hot (20)

Chapter 1 introduction to computer networks
Chapter 1 introduction to computer networksChapter 1 introduction to computer networks
Chapter 1 introduction to computer networks
 
[Question Paper] Object Oriented Programming With C++ (Revised Course) [April...
[Question Paper] Object Oriented Programming With C++ (Revised Course) [April...[Question Paper] Object Oriented Programming With C++ (Revised Course) [April...
[Question Paper] Object Oriented Programming With C++ (Revised Course) [April...
 
Computer communication and networks
Computer communication and networksComputer communication and networks
Computer communication and networks
 
Merge sort and quick sort
Merge sort and quick sortMerge sort and quick sort
Merge sort and quick sort
 
Database Relationships
Database RelationshipsDatabase Relationships
Database Relationships
 
Ppt of types of-network
Ppt of types of-network Ppt of types of-network
Ppt of types of-network
 
Data structure lecture 1
Data structure lecture 1Data structure lecture 1
Data structure lecture 1
 
networking
networkingnetworking
networking
 
Unit II - 3 - Operating System - Process Synchronization
Unit II - 3 - Operating System - Process SynchronizationUnit II - 3 - Operating System - Process Synchronization
Unit II - 3 - Operating System - Process Synchronization
 
Parallel computing and its applications
Parallel computing and its applicationsParallel computing and its applications
Parallel computing and its applications
 
Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)
 
Selection sorting
Selection sortingSelection sorting
Selection sorting
 
Network topology
Network topologyNetwork topology
Network topology
 
Types of network
Types of networkTypes of network
Types of network
 
Ch1 language design issue
Ch1 language design issueCh1 language design issue
Ch1 language design issue
 
Operating Systems - memory management
Operating Systems - memory managementOperating Systems - memory management
Operating Systems - memory management
 
Lecture #5 Data Communication and Network
Lecture #5 Data Communication and NetworkLecture #5 Data Communication and Network
Lecture #5 Data Communication and Network
 
Introduction to IoT - Unit I
Introduction to IoT - Unit IIntroduction to IoT - Unit I
Introduction to IoT - Unit I
 
Database Management System Introduction
Database Management System IntroductionDatabase Management System Introduction
Database Management System Introduction
 
Lecture 1 data structures and algorithms
Lecture 1 data structures and algorithmsLecture 1 data structures and algorithms
Lecture 1 data structures and algorithms
 

Viewers also liked

Basics of telecommunication and networking
Basics of telecommunication and networkingBasics of telecommunication and networking
Basics of telecommunication and networking
Milan Padariya
 
Susanna Camusso: la Rete ti vede così
Susanna Camusso: la Rete ti vede cosìSusanna Camusso: la Rete ti vede così
Susanna Camusso: la Rete ti vede così
Reputation Manager
 
A18 49 & A25 54 Nov One Sheets Lite
A18 49 & A25 54 Nov One Sheets LiteA18 49 & A25 54 Nov One Sheets Lite
A18 49 & A25 54 Nov One Sheets Lite
Americateve, Sherjan Broadcasting
 
RBS Business Capital
RBS Business CapitalRBS Business Capital
RBS Business Capital
mpetix
 
2. De trabajador a colaborador
2. De trabajador a colaborador2. De trabajador a colaborador
2. De trabajador a colaborador
Universidad Autónoma de Ica
 
Lidings China & Pacific Expertise
Lidings China & Pacific ExpertiseLidings China & Pacific Expertise
Lidings China & Pacific Expertise
Andrey Zelenin
 
Roman Legions
Roman LegionsRoman Legions
Roman Legions
ham97
 
Il risparmio gestito nell'era di internet: l'influenza delle opinioni on line...
Il risparmio gestito nell'era di internet: l'influenza delle opinioni on line...Il risparmio gestito nell'era di internet: l'influenza delle opinioni on line...
Il risparmio gestito nell'era di internet: l'influenza delle opinioni on line...
Reputation Manager
 
Social Reputation Analytics- Big Data Analytics Conference 2013
Social Reputation Analytics- Big Data Analytics Conference 2013Social Reputation Analytics- Big Data Analytics Conference 2013
Social Reputation Analytics- Big Data Analytics Conference 2013
Reputation Manager
 
Amministrative 2011: la popolarità dei candidati su Facebook
Amministrative 2011: la popolarità dei candidati su FacebookAmministrative 2011: la popolarità dei candidati su Facebook
Amministrative 2011: la popolarità dei candidati su Facebook
Reputation Manager
 
iCAMS-AFS
iCAMS-AFSiCAMS-AFS
iCAMS-AFS
mrdibyendu
 
A Five Year Plan V.2
A Five Year Plan V.2A Five Year Plan V.2
A Five Year Plan V.2
ASHRAE PHILIPPINES
 
Skills and methods
Skills and methodsSkills and methods
Skills and methods
ham97
 
Progressivism under taft
Progressivism under taftProgressivism under taft
Progressivism under taft
ham97
 
Christian Freedom
Christian FreedomChristian Freedom
Christian Freedom
John Gonzalez
 
J7
J7J7
Sanremo 2012: statistiche su Twitter e Facebook
Sanremo 2012: statistiche su Twitter e FacebookSanremo 2012: statistiche su Twitter e Facebook
Sanremo 2012: statistiche su Twitter e Facebook
Reputation Manager
 
Business School 2013: la Rete si vede così
Business School 2013: la Rete si vede così Business School 2013: la Rete si vede così
Business School 2013: la Rete si vede così
Reputation Manager
 
Rule and order in greek city states
Rule and order in greek city statesRule and order in greek city states
Rule and order in greek city states
ham97
 
The Making To Launch Of The Discovery
The Making To Launch Of The DiscoveryThe Making To Launch Of The Discovery
The Making To Launch Of The Discovery
Natarajan Hariharan
 

Viewers also liked (20)

Basics of telecommunication and networking
Basics of telecommunication and networkingBasics of telecommunication and networking
Basics of telecommunication and networking
 
Susanna Camusso: la Rete ti vede così
Susanna Camusso: la Rete ti vede cosìSusanna Camusso: la Rete ti vede così
Susanna Camusso: la Rete ti vede così
 
A18 49 & A25 54 Nov One Sheets Lite
A18 49 & A25 54 Nov One Sheets LiteA18 49 & A25 54 Nov One Sheets Lite
A18 49 & A25 54 Nov One Sheets Lite
 
RBS Business Capital
RBS Business CapitalRBS Business Capital
RBS Business Capital
 
2. De trabajador a colaborador
2. De trabajador a colaborador2. De trabajador a colaborador
2. De trabajador a colaborador
 
Lidings China & Pacific Expertise
Lidings China & Pacific ExpertiseLidings China & Pacific Expertise
Lidings China & Pacific Expertise
 
Roman Legions
Roman LegionsRoman Legions
Roman Legions
 
Il risparmio gestito nell'era di internet: l'influenza delle opinioni on line...
Il risparmio gestito nell'era di internet: l'influenza delle opinioni on line...Il risparmio gestito nell'era di internet: l'influenza delle opinioni on line...
Il risparmio gestito nell'era di internet: l'influenza delle opinioni on line...
 
Social Reputation Analytics- Big Data Analytics Conference 2013
Social Reputation Analytics- Big Data Analytics Conference 2013Social Reputation Analytics- Big Data Analytics Conference 2013
Social Reputation Analytics- Big Data Analytics Conference 2013
 
Amministrative 2011: la popolarità dei candidati su Facebook
Amministrative 2011: la popolarità dei candidati su FacebookAmministrative 2011: la popolarità dei candidati su Facebook
Amministrative 2011: la popolarità dei candidati su Facebook
 
iCAMS-AFS
iCAMS-AFSiCAMS-AFS
iCAMS-AFS
 
A Five Year Plan V.2
A Five Year Plan V.2A Five Year Plan V.2
A Five Year Plan V.2
 
Skills and methods
Skills and methodsSkills and methods
Skills and methods
 
Progressivism under taft
Progressivism under taftProgressivism under taft
Progressivism under taft
 
Christian Freedom
Christian FreedomChristian Freedom
Christian Freedom
 
J7
J7J7
J7
 
Sanremo 2012: statistiche su Twitter e Facebook
Sanremo 2012: statistiche su Twitter e FacebookSanremo 2012: statistiche su Twitter e Facebook
Sanremo 2012: statistiche su Twitter e Facebook
 
Business School 2013: la Rete si vede così
Business School 2013: la Rete si vede così Business School 2013: la Rete si vede così
Business School 2013: la Rete si vede così
 
Rule and order in greek city states
Rule and order in greek city statesRule and order in greek city states
Rule and order in greek city states
 
The Making To Launch Of The Discovery
The Making To Launch Of The DiscoveryThe Making To Launch Of The Discovery
The Making To Launch Of The Discovery
 

Similar to Basics Of Networking

Bab3
Bab3Bab3
Bab3
meisaina
 
Data Communication & Network
Data Communication & NetworkData Communication & Network
Data Communication & Network
Maulen Bale
 
Dcn(data communication and computer network)
Dcn(data communication and computer network)Dcn(data communication and computer network)
Dcn(data communication and computer network)
Ramakrishna kapa
 
Bab3-computer network
Bab3-computer networkBab3-computer network
Bab3-computer network
Aten Kecik
 
Communication information technology
Communication information technologyCommunication information technology
Communication information technology
Chittagong University
 
FUNDAMENTAL OF NETWORK
FUNDAMENTAL OF NETWORKFUNDAMENTAL OF NETWORK
FUNDAMENTAL OF NETWORK
vikram mahendra
 
Data Communication and Computer Network Overview
Data Communication and Computer Network Overview Data Communication and Computer Network Overview
Data Communication and Computer Network Overview
RANVIJAY GAUR
 
Basic concept of Computer networks
Basic concept of Computer networks Basic concept of Computer networks
Basic concept of Computer networks
ShohanaakterKakon
 
Terminologies used with networking
Terminologies used with networkingTerminologies used with networking
Terminologies used with networking
chamwama
 
Computer Network - Unit 1
Computer Network - Unit 1Computer Network - Unit 1
Computer Network - Unit 1
Chandan Gupta Bhagat
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
reddydivakara
 
Network and programming language
Network and programming languageNetwork and programming language
Network and programming language
RajThakuri
 
Computer networks
Computer networksComputer networks
Computer networking
Computer networkingComputer networking
Computer networking
JayVerma35
 
Classification computer network
Classification computer networkClassification computer network
Classification computer network
MH Shihab
 
NF_Ch1_Introduction.pptx
NF_Ch1_Introduction.pptxNF_Ch1_Introduction.pptx
NF_Ch1_Introduction.pptx
mmmm11111
 
Network
NetworkNetwork
Network
Asad Ali
 
group 10.pptx
group 10.pptxgroup 10.pptx
group 10.pptx
AshrafulIslam196006
 
Computer-Network-class-presentaiton.pptx
Computer-Network-class-presentaiton.pptxComputer-Network-class-presentaiton.pptx
Computer-Network-class-presentaiton.pptx
dairylvirrey1
 
Basic lecture
Basic lectureBasic lecture
Basic lecture
Batzaya Dashdondog
 

Similar to Basics Of Networking (20)

Bab3
Bab3Bab3
Bab3
 
Data Communication & Network
Data Communication & NetworkData Communication & Network
Data Communication & Network
 
Dcn(data communication and computer network)
Dcn(data communication and computer network)Dcn(data communication and computer network)
Dcn(data communication and computer network)
 
Bab3-computer network
Bab3-computer networkBab3-computer network
Bab3-computer network
 
Communication information technology
Communication information technologyCommunication information technology
Communication information technology
 
FUNDAMENTAL OF NETWORK
FUNDAMENTAL OF NETWORKFUNDAMENTAL OF NETWORK
FUNDAMENTAL OF NETWORK
 
Data Communication and Computer Network Overview
Data Communication and Computer Network Overview Data Communication and Computer Network Overview
Data Communication and Computer Network Overview
 
Basic concept of Computer networks
Basic concept of Computer networks Basic concept of Computer networks
Basic concept of Computer networks
 
Terminologies used with networking
Terminologies used with networkingTerminologies used with networking
Terminologies used with networking
 
Computer Network - Unit 1
Computer Network - Unit 1Computer Network - Unit 1
Computer Network - Unit 1
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
Network and programming language
Network and programming languageNetwork and programming language
Network and programming language
 
Computer networks
Computer networksComputer networks
Computer networks
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Classification computer network
Classification computer networkClassification computer network
Classification computer network
 
NF_Ch1_Introduction.pptx
NF_Ch1_Introduction.pptxNF_Ch1_Introduction.pptx
NF_Ch1_Introduction.pptx
 
Network
NetworkNetwork
Network
 
group 10.pptx
group 10.pptxgroup 10.pptx
group 10.pptx
 
Computer-Network-class-presentaiton.pptx
Computer-Network-class-presentaiton.pptxComputer-Network-class-presentaiton.pptx
Computer-Network-class-presentaiton.pptx
 
Basic lecture
Basic lectureBasic lecture
Basic lecture
 

More from paramalways

Competition Act, 2002
Competition Act, 2002Competition Act, 2002
Competition Act, 2002
paramalways
 
Environment Act, 1986
Environment Act, 1986Environment Act, 1986
Environment Act, 1986paramalways
 
Statistics All
Statistics AllStatistics All
Statistics All
paramalways
 
software engineering
software engineeringsoftware engineering
software engineering
paramalways
 
Dynamic Programming
Dynamic ProgrammingDynamic Programming
Dynamic Programming
paramalways
 
Iti Lprocessmgmt
Iti LprocessmgmtIti Lprocessmgmt
Iti Lprocessmgmt
paramalways
 
It Service Management
It Service ManagementIt Service Management
It Service Management
paramalways
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technology
paramalways
 
Dm Ps Analysis
Dm Ps AnalysisDm Ps Analysis
Dm Ps Analysis
paramalways
 
Decision Support System
Decision Support SystemDecision Support System
Decision Support System
paramalways
 
Bis Data Information
Bis Data InformationBis Data Information
Bis Data Information
paramalways
 
Bis Tools Of It
Bis Tools Of ItBis Tools Of It
Bis Tools Of It
paramalways
 

More from paramalways (12)

Competition Act, 2002
Competition Act, 2002Competition Act, 2002
Competition Act, 2002
 
Environment Act, 1986
Environment Act, 1986Environment Act, 1986
Environment Act, 1986
 
Statistics All
Statistics AllStatistics All
Statistics All
 
software engineering
software engineeringsoftware engineering
software engineering
 
Dynamic Programming
Dynamic ProgrammingDynamic Programming
Dynamic Programming
 
Iti Lprocessmgmt
Iti LprocessmgmtIti Lprocessmgmt
Iti Lprocessmgmt
 
It Service Management
It Service ManagementIt Service Management
It Service Management
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technology
 
Dm Ps Analysis
Dm Ps AnalysisDm Ps Analysis
Dm Ps Analysis
 
Decision Support System
Decision Support SystemDecision Support System
Decision Support System
 
Bis Data Information
Bis Data InformationBis Data Information
Bis Data Information
 
Bis Tools Of It
Bis Tools Of ItBis Tools Of It
Bis Tools Of It
 

Recently uploaded

Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 

Recently uploaded (20)

Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 

Basics Of Networking

  • 1. Basics of Telecommunications and Networking
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 8.
  • 9.
  • 10.
  • 11.
  • 13. Internet Media Finance Computers Real Estate Education Health Government Universities Business Server User Client Model of Internet Setup
  • 14. Email application Client Server Client Email client sends message to server Message is stored on POP server Later, recipient’s email client retrieves message from server
  • 15.
  • 16.
  • 17.
  • 18. To summarize Yes Business partners Extranet Yes Employees & Managers Intranet No Anyone Internet Need of user id and password Users Type
  • 19.
  • 20. VPN - Layout Tunnel ISP ISP Firewall (data Encoded) Firewall (data Encoded) Sending Computer Receiving Computer
  • 21.
  • 22.
  • 23.
  • 24. A Star topology connects all the nodes directly to the server or to a connecting device such as a hub .
  • 25. All nodes on a Bus topology are connected to a central line or backbone.
  • 26. Nodes on a Ring topology are connected in a closed loop. This means that each node has two connections, one in and another out. Using this type of topology the data must travel through all the nodes.
  • 27. Thank You…. Help is available !

Editor's Notes

  1. ISDN-Integrated services digital network