SlideShare a Scribd company logo
Chapter 1
Basic Network Concepts
Overview
• Introduction to networks.
• Need for networks.
• Application of Computer Network
• Classification of networks.
– By Their Geography
– By Their Component Role
Introduction to Networks
• A network consists of two or
more entities or objects
sharing resources and information.
• Human Network:-
– Network of Human being eg:- social structure
– Nodes:- individuals , Links:-cellphone ,Email ,emotioal,
cultural etc
– Types:
A. Family Network: within family ,Mother-father-children
B. Peer Network: community & family eg:- school –family-work
C. Restaurant network : waiter –customer
D. Contact Network:- Job search
Computer Network
• A computer network consists of two
or more computing devices
connected to each other to share
resources and information.
•Communication & sharing of resources with other computers
takes place on the same network or entirely distinct networks.
•Computers on a network can act as a client or a server.
•A client is a computer that requests for resources.
•A server is a computer that controls and provides access to
resources.
•Network access to data must be evaluated carefully to avoid
security issues.
Need for Networks
• Enhance communication.
• Share resources.
• Facilitate centralized management.
Enhance Communication
• Computer networks facilitates interpersonal
communication via email, instant messaging,
chat room, telephone, video telephone &
video conferencing
• By using networks, information can be sent to
a larger audience in an extremely fast and
efficient manner.
Share Resources
• A copy of data or application stored at a single central
location is shared over a network. , thereby saving
storage space on individual computers
• Computer peripheral devices can be attached to a
computer and be shared in a network. Peripheral devices
include faxes, modems, scanners, plotters
• Equipments having common requirements can be shared
in order to reduce maintenance cost.
• Computer applications, which take up a considerable
amount of storage space, can be installed centrally on
the network, saving storage space
Facilitate Centralized Management
 Management of software : Software can be installed at a central
location using servers, where the installation files are made accessible
over the network .This reduces cost of buying expensive s/w
• Management of Network : Network administrator keeps track of
network speed, traffic , performance by using different tools.(eg:-
Network analyzer , Network management protocol)
• Keeping data backup :- data from computer system is copied from disk
to some other medium for keeping it safe. Backup policies:- full backup,
Replication , Incremental
• Centralized Network security:
Features of Network
• File Sharing
• Printer Sharing
• Application Services
• E-mail
• Remote Access
• Internet /Intranet
• Network Security
File Sharing
• Network file sharing is the process of copying files from one computer to
another using a live network connection.
• File Sharing With Microsoft Windows :Windows file folders can be shared
across a LAN. You can also set up security access restrictions that control
who can obtain the shared files.
• FTP File Transfers :FTP server holds all the files to be shared, while remote
computers running FTP client software can log in to the server to obtain
copies.
• P2P - Peer to Peer File Sharing:is a popular method for swapping large files
on the Internet, particularly music and videos. Unlike FTP, most P2P file
sharing systems do not use any central servers but instead allow all
computers on the network to function both as a client and a server.
eg:torrent
Printer Sharing
• By use of Operating System:All modern versions of
OS include a feature called File and Printer Sharing
that allows a printer connected to one PC to be
shared with other PCs on a local network.
• Printers Having Built-In Network Capability: network
printers, are specifically designed for connecting
directly to a computer network. It allow entering
configuration data through a small keypad and screen
on the front of the unit. The screen also displays error
messages
• print server : It is a networked computer with one or
more shared printers
Application Services
• Sharing application on network eg: MS-office.
When a client (don’t have MS-office)wants to
run the program then application loads from
server into clients own memory
• Shared installation:-share all setup file on
server
E-mail
• electronic mail, the transmission of messages
over networks.
• Today's email systems are based on a store-and-forward
model. Email servers accept, forward, deliver, and store
messages.
• Types:
– Webmail :This allows users to log into the email
account by using a web browser to send and receive
their email eg:gmail
– POP3 email services:email messages are downloaded
to the client device (i.e. a computer) and then they
are deleted from the mail server.
Remote access
• allows logging into a system as an authorized
user without being physically present at its
keyboard
• Remote Desktop :eg:remote desktopsupport
• Remote Access to Files : remote network access
allows files to be read from and written to the
target, even without remote desktop capability
in place.
Classification of Networks
• Classification by network geography.
• Classification by component roles.
Classification by Network
Geography
• Networks are frequently classified according
to the geographical boundaries spanned by
the network itself.
• eg: PAN,LAN, MAN ,WAN,CAN and MAN are
the basic types of classification, of which LAN
and WAN are frequently used.
Local area network (LAN):
– A LAN covers a relatively small area such as a classroom, school,
or a single building.
– LANs are inexpensive to install and also provide higher speeds.
– LANs are also typically owned, controlled, and managed by a
single person or organization.
– They also tend to use certain connectivity technologies,
primarily Ethernet and Token Ring.
– On a single LAN, computers and servers may be connected by
cables or wirelessly
– High rate of data transmission :Is very fast, with speeds from 10
Mbps to 10 Gbps
• LAN’s enable the sharing of resources such as files or hardware
devices that may be needed by multiple users
Local area network
Classification by Network
Geography
LAN basics
• LAN’s can either be wired or wireless. Eg: twisted pair in wired
• Nodes in a LAN are linked together with a certain topology. Eg:BUS
• A node is defined to be any device connected to the network. This
could be a computer, a printer etc.
• A Hub is a networking device that connects multiple segments of
the network together
• A Network Interface Card (NIC) is the circuit board that is used to
connect computers to the network. In most cases, this is an
Ethernet card plugged in a computer’s motherboard
• The Network Operating System (NOS) is the software that enables
users to share files and hardware and communicate with other
computers. Examples of NOS include: Windows XP, Windows NT,
Sun Solaris, Linux, etc..
• Resource sharing in a LAN is accomplished with different access
methods. These include: Token based access ,CSMA/CD
Metropolitan area network (MAN):
– A MAN spans the distance of a typical metropolitan
city.
– The cost of installation and operation is higher.
– MANs use high-speed connections such as fiber optics
to achieve higher speeds.
– Types:-
• single network such as cable tv
• Connecting multiple LANs into a larger network .
– It may wholly owned by a company or it may be
service provided by public company such as telephone
company(Switched Multi-megabit Data Service SMDS)
Metropolitan area network
MAN
Wide area network (WAN):
– WANs span a larger area than a single city.(country)
– These use long distance telecommunication networks for
connection, thereby increasing the cost.
– The Internet is a good example of a WAN.
– WAN utilized public, leased line, satellite channel ,private
communication equipment in combination
– WAN which is wholly Owned by Single company refereed
as Enterprise network
– Because of large distance in WAN , the propogation delay
& variable signal travel times are major problem
– Uses Mesh topology majorly
Wide area network
WAN
Personal Area Network(PAN)
• It is organized around individual person eg:
cellphone with earphone
• A network covering a very small area, usually a
small room(10m).
• The best known wireless PAN network technology
is Bluetooth,
• The most popular wired PAN is USB.
• PANs can be viewed as a special type (or subset)
of local area network (LAN) that supports one
person instead of a group.
Campus Area Network (CAN)
• CAN is a computer network made up of an
interconnection of local area networks (LANs) within a
limited geographical area
• The networking equipments (switches, routers) and
transmission media (optical fiber, copper plant, Cat5
cabling etc.) are almost entirely owned by
the campus tenant / owner: an enterprise, university,
government etc.
• all of the nodes in a campus network are interconnected
by means ofoptical fiber media, taking advantage
of Gigabit Ethernet or 10-Gigabit Ethernet technology. In
some cases, Wi-Fi hot spots or even a hot zone make up
the user end of the network,
CAN
Classification by Component Roles
• Networks can also be classified according to
the roles that the networked computers play
in the network’s operation.
• Peer-to-peer, server-based, and client-based
are the types of roles into which networks are
classified.
Classification by Component Roles
Peer-to-peer:
– In a peer-to-peer network, all computers are considered
equal.
– Each computer controls its own information and is capable
of functioning as either a client or a server depending
upon the requirement.
– Peer-to-peer networks are inexpensive and easy to install.
– They are popular as home networks and for use in small
companies.
Classification by Component Roles
Peer-to-peer (continued):
– Most operating systems come with built-in peer-
to-peer networking capability.
– The maximum number of peers that can operate
on a peer-to-peer network is ten.
– Each peer shares resources and allows others
open access to them.
Classification by Component Roles
Peer-to-peer (continued):
– Peer-to-peer networks become difficult to manage
when more security is added to resources, since
the users control their security by password-
protecting shares.
– Shares can be document folders, printers,
peripherals, and any other resource that they
control on their computers.
Classification by Component Roles
Peer-to-peer network
Classification by Component Roles
Server-based:
– A server-based network offers centralized control
and is designed for secure operations.
– In a server-based network, a dedicated server
controls the network.
Classification by Component Roles
Server-based (continued):
– A dedicated server is one that services the
network by storing data, applications, resources,
and also provides access to resources required by
the client.
– These servers can also control the network’s
security from one centralized location or share it
with other specially configured servers.
Classification by Component Roles
Server-based network
Classification by Component Roles
– Client Server based network servers process requests from
clients and return just the results.
– Very Reliable
– Better Performance: These networks take advantage of the
powerful processing capabilities of both the client and the
server.
– Application servers and communications servers are
examples of clientserver-based networks.
– Specialized network Operating System required
– If server fails entire system fails
– Centralized Backup Taking Backup is easier
– Require professional administrator
– More Network intensive & expensive
Classification by Component Roles
Client-based network
Summary
• A network consists of two or more entities sharing
resources and information.
• A computer network consists of two or more
computers that are connected and are able to
communicate.
• The basic purpose of networks is to enable
effective communication, share resources, and
facilitate centralized management of data.
• Networks can be classified according to their
geographical boundaries or their component roles.

More Related Content

Similar to chapter one introduction to computer network maruf.pptx

Distributed Systems - Information Technology
Distributed Systems - Information TechnologyDistributed Systems - Information Technology
Distributed Systems - Information Technology
Sagar Mehta
 
data communication and Network.ppt
data communication and Network.pptdata communication and Network.ppt
data communication and Network.ppt
GetachewDires1
 
14.-NETWORKS.pptx
14.-NETWORKS.pptx14.-NETWORKS.pptx
14.-NETWORKS.pptx
andree45846
 
Basics of Computer Network
Basics of Computer NetworkBasics of Computer Network
Basics of Computer Network
sandipbanerjee49
 
UNIT 4 computer networking powerpoint presentation .pdf
UNIT 4 computer networking powerpoint presentation .pdfUNIT 4 computer networking powerpoint presentation .pdf
UNIT 4 computer networking powerpoint presentation .pdf
shubhangisonawane6
 
PC 106 Slide no.02
PC 106 Slide no.02PC 106 Slide no.02
PC 106 Slide no.02
MLG College of Learning, Inc
 
Computer Network | BBA First Semester
Computer Network | BBA First SemesterComputer Network | BBA First Semester
Computer Network | BBA First Semester
Hem Pokhrel
 
Computer networking
Computer networkingComputer networking
Computer networking
Tapan Khilar
 
Synapseindia revirews about networking
Synapseindia revirews about networkingSynapseindia revirews about networking
Synapseindia revirews about networking
saritasingh19866
 
Net 02 03_lan
Net 02 03_lanNet 02 03_lan
Net 02 03_lan
Protik Roy
 
L1 - Computer Networks Review.pptx
L1 - Computer Networks Review.pptxL1 - Computer Networks Review.pptx
L1 - Computer Networks Review.pptx
MohamedFouardKanu
 
computer network 2
computer network 2computer network 2
computer network 2
FLYMAN TECHNOLOGY LIMITED
 
network fundamentals
network fundamentalsnetwork fundamentals
network fundamentals
Sithu PM
 
Lecture 1
Lecture 1Lecture 1
Lecture 1
Tanveer Malik
 
Networking
Networking Networking
Networks1
Networks1Networks1
Networks1
Aarti P
 
ICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptx
ICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptxICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptx
ICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptx
mbombongafu
 
LAN MAN WAN.pptx
LAN MAN WAN.pptxLAN MAN WAN.pptx
LAN MAN WAN.pptx
MeisterPraba2
 
Types of Computer Network
Types of Computer NetworkTypes of Computer Network
Types of Computer Network
Mohit Dasariya
 
Computer network 1
Computer network 1Computer network 1
Computer network 1
gondwana university
 

Similar to chapter one introduction to computer network maruf.pptx (20)

Distributed Systems - Information Technology
Distributed Systems - Information TechnologyDistributed Systems - Information Technology
Distributed Systems - Information Technology
 
data communication and Network.ppt
data communication and Network.pptdata communication and Network.ppt
data communication and Network.ppt
 
14.-NETWORKS.pptx
14.-NETWORKS.pptx14.-NETWORKS.pptx
14.-NETWORKS.pptx
 
Basics of Computer Network
Basics of Computer NetworkBasics of Computer Network
Basics of Computer Network
 
UNIT 4 computer networking powerpoint presentation .pdf
UNIT 4 computer networking powerpoint presentation .pdfUNIT 4 computer networking powerpoint presentation .pdf
UNIT 4 computer networking powerpoint presentation .pdf
 
PC 106 Slide no.02
PC 106 Slide no.02PC 106 Slide no.02
PC 106 Slide no.02
 
Computer Network | BBA First Semester
Computer Network | BBA First SemesterComputer Network | BBA First Semester
Computer Network | BBA First Semester
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Synapseindia revirews about networking
Synapseindia revirews about networkingSynapseindia revirews about networking
Synapseindia revirews about networking
 
Net 02 03_lan
Net 02 03_lanNet 02 03_lan
Net 02 03_lan
 
L1 - Computer Networks Review.pptx
L1 - Computer Networks Review.pptxL1 - Computer Networks Review.pptx
L1 - Computer Networks Review.pptx
 
computer network 2
computer network 2computer network 2
computer network 2
 
network fundamentals
network fundamentalsnetwork fundamentals
network fundamentals
 
Lecture 1
Lecture 1Lecture 1
Lecture 1
 
Networking
Networking Networking
Networking
 
Networks1
Networks1Networks1
Networks1
 
ICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptx
ICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptxICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptx
ICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptx
 
LAN MAN WAN.pptx
LAN MAN WAN.pptxLAN MAN WAN.pptx
LAN MAN WAN.pptx
 
Types of Computer Network
Types of Computer NetworkTypes of Computer Network
Types of Computer Network
 
Computer network 1
Computer network 1Computer network 1
Computer network 1
 

More from MohamedAbdi347025

Ch 4.environmenta policy and legislationpptx
Ch 4.environmenta policy and legislationpptxCh 4.environmenta policy and legislationpptx
Ch 4.environmenta policy and legislationpptx
MohamedAbdi347025
 
chapter 3 and 4 cost behavior and Cost Volunme Profit Analysis.pptx
chapter 3 and 4 cost behavior and Cost Volunme Profit Analysis.pptxchapter 3 and 4 cost behavior and Cost Volunme Profit Analysis.pptx
chapter 3 and 4 cost behavior and Cost Volunme Profit Analysis.pptx
MohamedAbdi347025
 
lecture two job order practical 1 (1).pptx
lecture two job order practical 1 (1).pptxlecture two job order practical 1 (1).pptx
lecture two job order practical 1 (1).pptx
MohamedAbdi347025
 
Chapter_03international accounting .pptx
Chapter_03international accounting .pptxChapter_03international accounting .pptx
Chapter_03international accounting .pptx
MohamedAbdi347025
 
Exercises with solutions CHAPTER 0104 (1).pdf
Exercises with solutions CHAPTER 0104 (1).pdfExercises with solutions CHAPTER 0104 (1).pdf
Exercises with solutions CHAPTER 0104 (1).pdf
MohamedAbdi347025
 
ACCOUNTing international accountingaIAS.pptx
ACCOUNTing international accountingaIAS.pptxACCOUNTing international accountingaIAS.pptx
ACCOUNTing international accountingaIAS.pptx
MohamedAbdi347025
 
chapter one introduction to forensic acclounting.pptx
chapter one introduction to forensic acclounting.pptxchapter one introduction to forensic acclounting.pptx
chapter one introduction to forensic acclounting.pptx
MohamedAbdi347025
 
introduction to international accounting .pptx
introduction to international accounting .pptxintroduction to international accounting .pptx
introduction to international accounting .pptx
MohamedAbdi347025
 
CHAPTER two Development and clasification.pptx
CHAPTER two Development and clasification.pptxCHAPTER two Development and clasification.pptx
CHAPTER two Development and clasification.pptx
MohamedAbdi347025
 
chapter one introduction to logistic.pptx
chapter one introduction to logistic.pptxchapter one introduction to logistic.pptx
chapter one introduction to logistic.pptx
MohamedAbdi347025
 
Chapter 2 advanced accounting one-1.pptx
Chapter 2 advanced accounting one-1.pptxChapter 2 advanced accounting one-1.pptx
Chapter 2 advanced accounting one-1.pptx
MohamedAbdi347025
 
chapter two: advanced accounting two.pptx
chapter two: advanced accounting two.pptxchapter two: advanced accounting two.pptx
chapter two: advanced accounting two.pptx
MohamedAbdi347025
 
Chapter 4 business statistics under.pptx
Chapter 4  business statistics  under.pptxChapter 4  business statistics  under.pptx
Chapter 4 business statistics under.pptx
MohamedAbdi347025
 
chapter two professional principle audit .pptx
chapter two professional principle audit .pptxchapter two professional principle audit .pptx
chapter two professional principle audit .pptx
MohamedAbdi347025
 
chapter 1 introduction forensic accounting
chapter 1 introduction  forensic accountingchapter 1 introduction  forensic accounting
chapter 1 introduction forensic accounting
MohamedAbdi347025
 
chapter 1 Managerial Acc introduction.pptx
chapter 1 Managerial Acc introduction.pptxchapter 1 Managerial Acc introduction.pptx
chapter 1 Managerial Acc introduction.pptx
MohamedAbdi347025
 
chap 1 principles of audit and assurance.pptx
chap 1 principles of audit and assurance.pptxchap 1 principles of audit and assurance.pptx
chap 1 principles of audit and assurance.pptx
MohamedAbdi347025
 
chapter two job order costing system .pptx
chapter two job order costing system .pptxchapter two job order costing system .pptx
chapter two job order costing system .pptx
MohamedAbdi347025
 
chapter- 1 inroduction to advanced financial accounting.pptx
chapter- 1 inroduction to advanced financial accounting.pptxchapter- 1 inroduction to advanced financial accounting.pptx
chapter- 1 inroduction to advanced financial accounting.pptx
MohamedAbdi347025
 
chapter two advanced manament accounting.pptx
chapter two advanced manament accounting.pptxchapter two advanced manament accounting.pptx
chapter two advanced manament accounting.pptx
MohamedAbdi347025
 

More from MohamedAbdi347025 (20)

Ch 4.environmenta policy and legislationpptx
Ch 4.environmenta policy and legislationpptxCh 4.environmenta policy and legislationpptx
Ch 4.environmenta policy and legislationpptx
 
chapter 3 and 4 cost behavior and Cost Volunme Profit Analysis.pptx
chapter 3 and 4 cost behavior and Cost Volunme Profit Analysis.pptxchapter 3 and 4 cost behavior and Cost Volunme Profit Analysis.pptx
chapter 3 and 4 cost behavior and Cost Volunme Profit Analysis.pptx
 
lecture two job order practical 1 (1).pptx
lecture two job order practical 1 (1).pptxlecture two job order practical 1 (1).pptx
lecture two job order practical 1 (1).pptx
 
Chapter_03international accounting .pptx
Chapter_03international accounting .pptxChapter_03international accounting .pptx
Chapter_03international accounting .pptx
 
Exercises with solutions CHAPTER 0104 (1).pdf
Exercises with solutions CHAPTER 0104 (1).pdfExercises with solutions CHAPTER 0104 (1).pdf
Exercises with solutions CHAPTER 0104 (1).pdf
 
ACCOUNTing international accountingaIAS.pptx
ACCOUNTing international accountingaIAS.pptxACCOUNTing international accountingaIAS.pptx
ACCOUNTing international accountingaIAS.pptx
 
chapter one introduction to forensic acclounting.pptx
chapter one introduction to forensic acclounting.pptxchapter one introduction to forensic acclounting.pptx
chapter one introduction to forensic acclounting.pptx
 
introduction to international accounting .pptx
introduction to international accounting .pptxintroduction to international accounting .pptx
introduction to international accounting .pptx
 
CHAPTER two Development and clasification.pptx
CHAPTER two Development and clasification.pptxCHAPTER two Development and clasification.pptx
CHAPTER two Development and clasification.pptx
 
chapter one introduction to logistic.pptx
chapter one introduction to logistic.pptxchapter one introduction to logistic.pptx
chapter one introduction to logistic.pptx
 
Chapter 2 advanced accounting one-1.pptx
Chapter 2 advanced accounting one-1.pptxChapter 2 advanced accounting one-1.pptx
Chapter 2 advanced accounting one-1.pptx
 
chapter two: advanced accounting two.pptx
chapter two: advanced accounting two.pptxchapter two: advanced accounting two.pptx
chapter two: advanced accounting two.pptx
 
Chapter 4 business statistics under.pptx
Chapter 4  business statistics  under.pptxChapter 4  business statistics  under.pptx
Chapter 4 business statistics under.pptx
 
chapter two professional principle audit .pptx
chapter two professional principle audit .pptxchapter two professional principle audit .pptx
chapter two professional principle audit .pptx
 
chapter 1 introduction forensic accounting
chapter 1 introduction  forensic accountingchapter 1 introduction  forensic accounting
chapter 1 introduction forensic accounting
 
chapter 1 Managerial Acc introduction.pptx
chapter 1 Managerial Acc introduction.pptxchapter 1 Managerial Acc introduction.pptx
chapter 1 Managerial Acc introduction.pptx
 
chap 1 principles of audit and assurance.pptx
chap 1 principles of audit and assurance.pptxchap 1 principles of audit and assurance.pptx
chap 1 principles of audit and assurance.pptx
 
chapter two job order costing system .pptx
chapter two job order costing system .pptxchapter two job order costing system .pptx
chapter two job order costing system .pptx
 
chapter- 1 inroduction to advanced financial accounting.pptx
chapter- 1 inroduction to advanced financial accounting.pptxchapter- 1 inroduction to advanced financial accounting.pptx
chapter- 1 inroduction to advanced financial accounting.pptx
 
chapter two advanced manament accounting.pptx
chapter two advanced manament accounting.pptxchapter two advanced manament accounting.pptx
chapter two advanced manament accounting.pptx
 

Recently uploaded

Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
Tobias Schneck
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
DianaGray10
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
Sease
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
Fwdays
 
AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)
HarpalGohil4
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 

Recently uploaded (20)

Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
 
AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 

chapter one introduction to computer network maruf.pptx

  • 2. Overview • Introduction to networks. • Need for networks. • Application of Computer Network • Classification of networks. – By Their Geography – By Their Component Role
  • 3. Introduction to Networks • A network consists of two or more entities or objects sharing resources and information. • Human Network:- – Network of Human being eg:- social structure – Nodes:- individuals , Links:-cellphone ,Email ,emotioal, cultural etc – Types: A. Family Network: within family ,Mother-father-children B. Peer Network: community & family eg:- school –family-work C. Restaurant network : waiter –customer D. Contact Network:- Job search
  • 4. Computer Network • A computer network consists of two or more computing devices connected to each other to share resources and information. •Communication & sharing of resources with other computers takes place on the same network or entirely distinct networks. •Computers on a network can act as a client or a server. •A client is a computer that requests for resources. •A server is a computer that controls and provides access to resources. •Network access to data must be evaluated carefully to avoid security issues.
  • 5. Need for Networks • Enhance communication. • Share resources. • Facilitate centralized management.
  • 6. Enhance Communication • Computer networks facilitates interpersonal communication via email, instant messaging, chat room, telephone, video telephone & video conferencing • By using networks, information can be sent to a larger audience in an extremely fast and efficient manner.
  • 7. Share Resources • A copy of data or application stored at a single central location is shared over a network. , thereby saving storage space on individual computers • Computer peripheral devices can be attached to a computer and be shared in a network. Peripheral devices include faxes, modems, scanners, plotters • Equipments having common requirements can be shared in order to reduce maintenance cost. • Computer applications, which take up a considerable amount of storage space, can be installed centrally on the network, saving storage space
  • 8. Facilitate Centralized Management  Management of software : Software can be installed at a central location using servers, where the installation files are made accessible over the network .This reduces cost of buying expensive s/w • Management of Network : Network administrator keeps track of network speed, traffic , performance by using different tools.(eg:- Network analyzer , Network management protocol) • Keeping data backup :- data from computer system is copied from disk to some other medium for keeping it safe. Backup policies:- full backup, Replication , Incremental • Centralized Network security:
  • 9. Features of Network • File Sharing • Printer Sharing • Application Services • E-mail • Remote Access • Internet /Intranet • Network Security
  • 10. File Sharing • Network file sharing is the process of copying files from one computer to another using a live network connection. • File Sharing With Microsoft Windows :Windows file folders can be shared across a LAN. You can also set up security access restrictions that control who can obtain the shared files. • FTP File Transfers :FTP server holds all the files to be shared, while remote computers running FTP client software can log in to the server to obtain copies. • P2P - Peer to Peer File Sharing:is a popular method for swapping large files on the Internet, particularly music and videos. Unlike FTP, most P2P file sharing systems do not use any central servers but instead allow all computers on the network to function both as a client and a server. eg:torrent
  • 11. Printer Sharing • By use of Operating System:All modern versions of OS include a feature called File and Printer Sharing that allows a printer connected to one PC to be shared with other PCs on a local network. • Printers Having Built-In Network Capability: network printers, are specifically designed for connecting directly to a computer network. It allow entering configuration data through a small keypad and screen on the front of the unit. The screen also displays error messages • print server : It is a networked computer with one or more shared printers
  • 12. Application Services • Sharing application on network eg: MS-office. When a client (don’t have MS-office)wants to run the program then application loads from server into clients own memory • Shared installation:-share all setup file on server
  • 13. E-mail • electronic mail, the transmission of messages over networks. • Today's email systems are based on a store-and-forward model. Email servers accept, forward, deliver, and store messages. • Types: – Webmail :This allows users to log into the email account by using a web browser to send and receive their email eg:gmail – POP3 email services:email messages are downloaded to the client device (i.e. a computer) and then they are deleted from the mail server.
  • 14. Remote access • allows logging into a system as an authorized user without being physically present at its keyboard • Remote Desktop :eg:remote desktopsupport • Remote Access to Files : remote network access allows files to be read from and written to the target, even without remote desktop capability in place.
  • 15. Classification of Networks • Classification by network geography. • Classification by component roles.
  • 16. Classification by Network Geography • Networks are frequently classified according to the geographical boundaries spanned by the network itself. • eg: PAN,LAN, MAN ,WAN,CAN and MAN are the basic types of classification, of which LAN and WAN are frequently used.
  • 17. Local area network (LAN): – A LAN covers a relatively small area such as a classroom, school, or a single building. – LANs are inexpensive to install and also provide higher speeds. – LANs are also typically owned, controlled, and managed by a single person or organization. – They also tend to use certain connectivity technologies, primarily Ethernet and Token Ring. – On a single LAN, computers and servers may be connected by cables or wirelessly – High rate of data transmission :Is very fast, with speeds from 10 Mbps to 10 Gbps • LAN’s enable the sharing of resources such as files or hardware devices that may be needed by multiple users
  • 18. Local area network Classification by Network Geography
  • 19. LAN basics • LAN’s can either be wired or wireless. Eg: twisted pair in wired • Nodes in a LAN are linked together with a certain topology. Eg:BUS • A node is defined to be any device connected to the network. This could be a computer, a printer etc. • A Hub is a networking device that connects multiple segments of the network together • A Network Interface Card (NIC) is the circuit board that is used to connect computers to the network. In most cases, this is an Ethernet card plugged in a computer’s motherboard • The Network Operating System (NOS) is the software that enables users to share files and hardware and communicate with other computers. Examples of NOS include: Windows XP, Windows NT, Sun Solaris, Linux, etc.. • Resource sharing in a LAN is accomplished with different access methods. These include: Token based access ,CSMA/CD
  • 20. Metropolitan area network (MAN): – A MAN spans the distance of a typical metropolitan city. – The cost of installation and operation is higher. – MANs use high-speed connections such as fiber optics to achieve higher speeds. – Types:- • single network such as cable tv • Connecting multiple LANs into a larger network . – It may wholly owned by a company or it may be service provided by public company such as telephone company(Switched Multi-megabit Data Service SMDS)
  • 22. Wide area network (WAN): – WANs span a larger area than a single city.(country) – These use long distance telecommunication networks for connection, thereby increasing the cost. – The Internet is a good example of a WAN. – WAN utilized public, leased line, satellite channel ,private communication equipment in combination – WAN which is wholly Owned by Single company refereed as Enterprise network – Because of large distance in WAN , the propogation delay & variable signal travel times are major problem – Uses Mesh topology majorly
  • 24. Personal Area Network(PAN) • It is organized around individual person eg: cellphone with earphone • A network covering a very small area, usually a small room(10m). • The best known wireless PAN network technology is Bluetooth, • The most popular wired PAN is USB. • PANs can be viewed as a special type (or subset) of local area network (LAN) that supports one person instead of a group.
  • 25.
  • 26. Campus Area Network (CAN) • CAN is a computer network made up of an interconnection of local area networks (LANs) within a limited geographical area • The networking equipments (switches, routers) and transmission media (optical fiber, copper plant, Cat5 cabling etc.) are almost entirely owned by the campus tenant / owner: an enterprise, university, government etc. • all of the nodes in a campus network are interconnected by means ofoptical fiber media, taking advantage of Gigabit Ethernet or 10-Gigabit Ethernet technology. In some cases, Wi-Fi hot spots or even a hot zone make up the user end of the network,
  • 27. CAN
  • 28. Classification by Component Roles • Networks can also be classified according to the roles that the networked computers play in the network’s operation. • Peer-to-peer, server-based, and client-based are the types of roles into which networks are classified.
  • 29. Classification by Component Roles Peer-to-peer: – In a peer-to-peer network, all computers are considered equal. – Each computer controls its own information and is capable of functioning as either a client or a server depending upon the requirement. – Peer-to-peer networks are inexpensive and easy to install. – They are popular as home networks and for use in small companies.
  • 30. Classification by Component Roles Peer-to-peer (continued): – Most operating systems come with built-in peer- to-peer networking capability. – The maximum number of peers that can operate on a peer-to-peer network is ten. – Each peer shares resources and allows others open access to them.
  • 31. Classification by Component Roles Peer-to-peer (continued): – Peer-to-peer networks become difficult to manage when more security is added to resources, since the users control their security by password- protecting shares. – Shares can be document folders, printers, peripherals, and any other resource that they control on their computers.
  • 32. Classification by Component Roles Peer-to-peer network
  • 33. Classification by Component Roles Server-based: – A server-based network offers centralized control and is designed for secure operations. – In a server-based network, a dedicated server controls the network.
  • 34. Classification by Component Roles Server-based (continued): – A dedicated server is one that services the network by storing data, applications, resources, and also provides access to resources required by the client. – These servers can also control the network’s security from one centralized location or share it with other specially configured servers.
  • 35. Classification by Component Roles Server-based network
  • 36. Classification by Component Roles – Client Server based network servers process requests from clients and return just the results. – Very Reliable – Better Performance: These networks take advantage of the powerful processing capabilities of both the client and the server. – Application servers and communications servers are examples of clientserver-based networks. – Specialized network Operating System required – If server fails entire system fails – Centralized Backup Taking Backup is easier – Require professional administrator – More Network intensive & expensive
  • 37. Classification by Component Roles Client-based network
  • 38. Summary • A network consists of two or more entities sharing resources and information. • A computer network consists of two or more computers that are connected and are able to communicate. • The basic purpose of networks is to enable effective communication, share resources, and facilitate centralized management of data. • Networks can be classified according to their geographical boundaries or their component roles.