SlideShare a Scribd company logo
1 of 7
Building a Secure and
Efficient Computer
Network
BY SWARNIM NIGAM
Network Architecture Overview
 A computer network is a collection of devices that are interconnected to
communicate and share resources. The architecture of a network refers to
the design and organization of its components and how they interact with
each other.
 There are various types of network architectures, including client-server,
peer-to-peer, and hybrid. Each architecture has its own advantages and
disadvantages, and the choice of architecture depends on the specific
needs and requirements of the network.
 In general, a network architecture consists of hardware components such
as routers, switches, and servers, as well as software components such as
protocols and applications. These components work together to ensure
efficient and reliable communication and resource sharing between
devices on the network.
Network Security Measures
 Firewalls
 We use firewalls to protect our network from unauthorized access and malicious attacks.

 Encryption
 We use encryption to secure our data transmissions and protect sensitive information.

 Access Control
 We implement access control measures to ensure that only authorized users can access
our network resources.

Hardware and Software Components
Hardware Components
• Routers
• Switches
• Firewalls
• Modems
Software Components
• Operating Systems
• Network Management Software
• Security Software
Bandwidth Management
 Effective bandwidth management is
essential for optimizing network
performance. This involves prioritizing
traffic and allocating bandwidth to
critical applications and services.
Network administrators can use
Quality of Service (QoS) protocols to
ensure that high-priority traffic is
given priority over low-priority traffic.
Additionally, bandwidth throttling can
be used to limit the amount of
bandwidth allocated to non-critical
applications.
Load Balancing
 Load balancing involves distributing
network traffic across multiple servers
or network devices to prevent any
single device from becoming
overloaded. This helps to improve
network performance by ensuring
that resources are utilized efficiently.
Load balancing can be implemented
using hardware or software solutions,
and can be configured to distribute
traffic based on various criteria such
as server availability, traffic type, and
geographic location.
Network Performance Optimization
Thank
You
Network Monitoring and Maintenance
Network Monitoring
 Network monitoring involves the
continuous observation and analysis
of network traffic to identify issues
and ensure optimal performance. This
can be done through various tools
and techniques, such as packet
sniffers, network analyzers, and flow-
based monitoring.
Network Maintenance
 Network maintenance involves the
regular upkeep and updates of
network hardware and software
components to ensure optimal
performance and security. This can
include tasks such as software patches
and updates, firmware upgrades, and
hardware replacements or repairs.

More Related Content

Similar to Building a secure and efficient computer Network

Campus Network Design Presentaion.pptx
Campus Network Design Presentaion.pptxCampus Network Design Presentaion.pptx
Campus Network Design Presentaion.pptxMejanurRahmanJunayed
 
Mark Attendance Recognition Systems .pdf
Mark Attendance Recognition Systems .pdfMark Attendance Recognition Systems .pdf
Mark Attendance Recognition Systems .pdfshourya112007
 
Network Administration and Maintenace.pptx
Network Administration and Maintenace.pptxNetwork Administration and Maintenace.pptx
Network Administration and Maintenace.pptxJuliusECatipon
 
NOC Services Enhancing Network Performance and Reliability with hex64.docx
NOC Services Enhancing Network Performance and Reliability with hex64.docxNOC Services Enhancing Network Performance and Reliability with hex64.docx
NOC Services Enhancing Network Performance and Reliability with hex64.docxHEX64
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 
Software Defined Networks - Unit -1- class lecture notes.pdf
Software Defined Networks - Unit -1- class lecture notes.pdfSoftware Defined Networks - Unit -1- class lecture notes.pdf
Software Defined Networks - Unit -1- class lecture notes.pdfsoftwaretrainer2elys
 
Network Management Market.pdf
Network Management Market.pdfNetwork Management Market.pdf
Network Management Market.pdfKaustubhBhandari6
 
Protocol design issue and computer networks protocol
Protocol  design issue and computer networks protocolProtocol  design issue and computer networks protocol
Protocol design issue and computer networks protocolmohsin327164
 
A Comprehensive Guide to Choosing the Best Network Monitoring Software
A Comprehensive Guide to Choosing the Best Network Monitoring SoftwareA Comprehensive Guide to Choosing the Best Network Monitoring Software
A Comprehensive Guide to Choosing the Best Network Monitoring SoftwareDevLabs Global
 
16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSN16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSNDhaya kanthavel
 
Outsourced Network Operations Center (NOC) Services Provider hex641.docx
Outsourced Network Operations Center (NOC) Services Provider hex641.docxOutsourced Network Operations Center (NOC) Services Provider hex641.docx
Outsourced Network Operations Center (NOC) Services Provider hex641.docxHEX64
 
Introduction-to-Networking-and-types(junaid_ali)[1].pptx
Introduction-to-Networking-and-types(junaid_ali)[1].pptxIntroduction-to-Networking-and-types(junaid_ali)[1].pptx
Introduction-to-Networking-and-types(junaid_ali)[1].pptxjunaidinamdar999
 
Performance management strategy
Performance management strategyPerformance management strategy
Performance management strategykatharine300
 
Network design consideration
Network design considerationNetwork design consideration
Network design considerationlavanya marichamy
 
Global Network Operations Center (NOC) Provider hex64.docx
Global Network Operations Center (NOC) Provider hex64.docxGlobal Network Operations Center (NOC) Provider hex64.docx
Global Network Operations Center (NOC) Provider hex64.docxHEX64
 
Computer Security.pptx
Computer Security.pptxComputer Security.pptx
Computer Security.pptxKENNEDYDONATO1
 
Firewalls and proxies are both use for security
Firewalls and proxies are both use for securityFirewalls and proxies are both use for security
Firewalls and proxies are both use for securityAyan974999
 

Similar to Building a secure and efficient computer Network (20)

Campus Network Design Presentaion.pptx
Campus Network Design Presentaion.pptxCampus Network Design Presentaion.pptx
Campus Network Design Presentaion.pptx
 
Mark Attendance Recognition Systems .pdf
Mark Attendance Recognition Systems .pdfMark Attendance Recognition Systems .pdf
Mark Attendance Recognition Systems .pdf
 
Network Administration and Maintenace.pptx
Network Administration and Maintenace.pptxNetwork Administration and Maintenace.pptx
Network Administration and Maintenace.pptx
 
NOC Services Enhancing Network Performance and Reliability with hex64.docx
NOC Services Enhancing Network Performance and Reliability with hex64.docxNOC Services Enhancing Network Performance and Reliability with hex64.docx
NOC Services Enhancing Network Performance and Reliability with hex64.docx
 
Network security
Network securityNetwork security
Network security
 
Design of network
Design of networkDesign of network
Design of network
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Software Defined Networks - Unit -1- class lecture notes.pdf
Software Defined Networks - Unit -1- class lecture notes.pdfSoftware Defined Networks - Unit -1- class lecture notes.pdf
Software Defined Networks - Unit -1- class lecture notes.pdf
 
Network Management Market.pdf
Network Management Market.pdfNetwork Management Market.pdf
Network Management Market.pdf
 
Network Management Market
Network Management MarketNetwork Management Market
Network Management Market
 
Protocol design issue and computer networks protocol
Protocol  design issue and computer networks protocolProtocol  design issue and computer networks protocol
Protocol design issue and computer networks protocol
 
A Comprehensive Guide to Choosing the Best Network Monitoring Software
A Comprehensive Guide to Choosing the Best Network Monitoring SoftwareA Comprehensive Guide to Choosing the Best Network Monitoring Software
A Comprehensive Guide to Choosing the Best Network Monitoring Software
 
16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSN16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSN
 
Outsourced Network Operations Center (NOC) Services Provider hex641.docx
Outsourced Network Operations Center (NOC) Services Provider hex641.docxOutsourced Network Operations Center (NOC) Services Provider hex641.docx
Outsourced Network Operations Center (NOC) Services Provider hex641.docx
 
Introduction-to-Networking-and-types(junaid_ali)[1].pptx
Introduction-to-Networking-and-types(junaid_ali)[1].pptxIntroduction-to-Networking-and-types(junaid_ali)[1].pptx
Introduction-to-Networking-and-types(junaid_ali)[1].pptx
 
Performance management strategy
Performance management strategyPerformance management strategy
Performance management strategy
 
Network design consideration
Network design considerationNetwork design consideration
Network design consideration
 
Global Network Operations Center (NOC) Provider hex64.docx
Global Network Operations Center (NOC) Provider hex64.docxGlobal Network Operations Center (NOC) Provider hex64.docx
Global Network Operations Center (NOC) Provider hex64.docx
 
Computer Security.pptx
Computer Security.pptxComputer Security.pptx
Computer Security.pptx
 
Firewalls and proxies are both use for security
Firewalls and proxies are both use for securityFirewalls and proxies are both use for security
Firewalls and proxies are both use for security
 

Recently uploaded

AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...caitlingebhard1
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 

Recently uploaded (20)

AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 

Building a secure and efficient computer Network

  • 1. Building a Secure and Efficient Computer Network BY SWARNIM NIGAM
  • 2. Network Architecture Overview  A computer network is a collection of devices that are interconnected to communicate and share resources. The architecture of a network refers to the design and organization of its components and how they interact with each other.  There are various types of network architectures, including client-server, peer-to-peer, and hybrid. Each architecture has its own advantages and disadvantages, and the choice of architecture depends on the specific needs and requirements of the network.  In general, a network architecture consists of hardware components such as routers, switches, and servers, as well as software components such as protocols and applications. These components work together to ensure efficient and reliable communication and resource sharing between devices on the network.
  • 3. Network Security Measures  Firewalls  We use firewalls to protect our network from unauthorized access and malicious attacks.   Encryption  We use encryption to secure our data transmissions and protect sensitive information.   Access Control  We implement access control measures to ensure that only authorized users can access our network resources. 
  • 4. Hardware and Software Components Hardware Components • Routers • Switches • Firewalls • Modems Software Components • Operating Systems • Network Management Software • Security Software
  • 5. Bandwidth Management  Effective bandwidth management is essential for optimizing network performance. This involves prioritizing traffic and allocating bandwidth to critical applications and services. Network administrators can use Quality of Service (QoS) protocols to ensure that high-priority traffic is given priority over low-priority traffic. Additionally, bandwidth throttling can be used to limit the amount of bandwidth allocated to non-critical applications. Load Balancing  Load balancing involves distributing network traffic across multiple servers or network devices to prevent any single device from becoming overloaded. This helps to improve network performance by ensuring that resources are utilized efficiently. Load balancing can be implemented using hardware or software solutions, and can be configured to distribute traffic based on various criteria such as server availability, traffic type, and geographic location. Network Performance Optimization
  • 7. Network Monitoring and Maintenance Network Monitoring  Network monitoring involves the continuous observation and analysis of network traffic to identify issues and ensure optimal performance. This can be done through various tools and techniques, such as packet sniffers, network analyzers, and flow- based monitoring. Network Maintenance  Network maintenance involves the regular upkeep and updates of network hardware and software components to ensure optimal performance and security. This can include tasks such as software patches and updates, firmware upgrades, and hardware replacements or repairs.