SlideShare a Scribd company logo
COMPUTER NETWORKS
Overview and architecture of computer
networks
Lecture 1
LECTURE CONTENT
1. Definition & applications of computer network
2. Components of computer network
3. Network benefits
4. Disadvantages of computer network
5. Classification by their geographical area
6. Network classification by their component role
7. Types of servers
DEFINITION & APPLICATION
A computer network is defined as the interconnection of
two or more computers. It is done to enable the computers to
communicate and share available resources.
Applications:
 Sharing of resources such as printers
 Sharing of expensive software’s and database
 Communication from one computer to another computer
 Exchange of data and information among users via
network
 Sharing of information over geographically wide areas.
COMPONENTS OF COMPUTER NETWORK
 Two or more computers
 Cables as links between the
computers
 A network interfacing card (NIC)
on each computer
 Switches
 Software called operating system
(OS)
The network provided to the users can be divided into two categories:
• Sharing
• Connectivity
NETWORK BENEFITS
Types of resources are:
Hardware: A network allows users to share many
hardware devices such as printers, modems, fax
machines, CD ROM, players, etc.
Software: Sharing software resources reduces the cost
of software installation, saves space on hard disk.
SHARING RESOURCES
OTHER BENEFITS OF COMPUTER NETWORK
 Increased speed
 Reduced cost
 Improved security
 Centralized software managements
 Electronic mail
 Flexible access
DISADVANTAGES OF NETWORK
 High cost of installation
 Requires time for administration
 Failure of server
 Cable faults
CLASSIFICATION OF AREA BY THEIR
GEOGRAPHY
NETWORK
PAN LAN WAN MAN CAN
LOCAL AREA NETWORK (LAN)
LAN is a network which is designed to operate over a small physical area such an office,
factory or a group of buildings.
LAN’s are easy to design and troubleshoot.
Exchange of information and sharing of resources becomes easy because of LAN.
In LAN all machines connected to a single cable.
Different types of topologies such as star, tree, bus, ring etc. can be used.
It is usually a privately owned network.
WIDE AREA NETWORK (WAN)
When networks span over a large distance of when the computers to be connected
to each other are at widely separated locations a local network cannot be used. A
wide are network (WAN) is installed.
The communication between different users of WAN is established using
leased telephone lines, satellite links and similar channels.
It is cheaper and more efficient to use the phone network for the link.
Most WAN networks are used to transfer large blocks of data between its users.
PERSONAL AREA NETWORK (PAN)
A personal area network is a computer network organized around an
individual person.
It generally consists of a mobile computer, a cell phone or personal a
digital assistant. PAN enables the communication among these devices.
It can also be used for communication among personal devices
themselves for connecting to a digital level network and internet.
The PAN’s can be constructed using wireless or cables.
CAMPUS AREA NETWORK (CAN)
The campus area network is made up of an
interconnection of LAN with limited geographical
area.
Network equipment such as switches, routers
and the transmission media i.e. optical fibre etc.
are almost entirely owned by the campus owner.
METROPOLITAN AREA NETWORK (MAN)
It is in between LAN & WAN technology that covers the entire city.
It is uses similar technology as LAN.
It can be a single network such as cable TV network, or a measure
of connecting a number of LAN’s or a large networks so that
resources can be shared LAN to LAN as well as device to device.
DISTUNGUISH BETWEEN LAN, WAN AND MAN
NETWORK CLASSIFICATION BY THEIR COMPONENT ROLE
PEER TO PEER NETWORK
In peer to peer network each computer is responsible for making its own
resources available to other computers on the network.
Each computer is responsible for setting up and maintaining its own security for
these resources.
Also each computer is responsible for accessing the required network resources
from peer to peer relationships.
Peer to peer network is useful for a small network containing less than 10
computers on a single LAN.
In peer to peer network each computer can function as both client and server.
Peer to peer networks do not have a central control system. There are no servers
in peer networks.
Peer networks are amplified into home group.
ADVENTAGES AND DISADVANTAGES OF PEER TO
PEER NETWORK
Advantages
• Use less expensive
computer hardware
• Easy to administer
• No NOS required
• More built in
redundancy
• Easy setup & low cost
Disadvantages
• Not very secure
• No central point of
storage or file archiving
• Additional load on
computer of resource
sharing
• Hard to maintain
version control
CLIENT/SERVER NETWORK
In client-server network relationships, certain computers act as server and other
act as client. A server is simply a computer, that available the network resources
and provides service to other computers when they request it. A client is the
computer running a program that requests the service from a server.
Local are network (LAN) is based on client server network relationship.
A client-server network is one on which all available network resources such as
files, directories, applications and shared devices, are centrally managed and
hosted and then are accessed by client.
Client serve network are defined by the presence of servers on a network that
provide security and administration of the network.
ADVENTAGES AND DISADVANTAGES OF CLIENT-
SERVER NETWORK
Advantages
• Very secure
• Better performance
• Centralized backup
• Very reliable
Disadvantages
• Requires professional
administration
• More hardware
intensive
• More software
intensive
• Expensive dedicated
TYPES OF SERVERS
TYPES OF SERVERS
File server: These servers provide the services for storing, retrieving and moving
the data. A user can read, write, exchange and manage the files with the help of
file servers.
Printer server: The printer server is used for controlling and managing printing on
the network. It also offers the fax service to the network users.
Application server: The expensive software and additional computing power can
be shared by the computers in a network with the help of application servers.
Message server: It is used to co-ordinate the interaction between users,
documents and application. The data can be used for audio, video, binary, text or
graphic.
Database server: It is a type of application server. It allows the users to access
the centralized strong database.
CONTROL QUESTIONS
What is computer network (CN)?
What are the main components of CN?
What is hardware/software?
For what purposes is LAN/WAN used for?
How does network classified by their component role?
What is the differences between peer to peer and client server network?
CN L1 — копия.ppt

More Related Content

Similar to CN L1 — копия.ppt

Introduction to computer_networks
Introduction to computer_networksIntroduction to computer_networks
Introduction to computer_networks
John Bakunda
 
Introduction to computer_networks
Introduction to computer_networksIntroduction to computer_networks
Introduction to computer_networks
nitu kedia
 
Introduction to computer_networks (unit1)
Introduction to computer_networks (unit1)Introduction to computer_networks (unit1)
Introduction to computer_networks (unit1)
Neha Kurale
 
Computer network 1
Computer network 1Computer network 1
Computer network 1
gondwana university
 
computer network basic concepets with diagram.pptx
computer network basic concepets with diagram.pptxcomputer network basic concepets with diagram.pptx
computer network basic concepets with diagram.pptx
PradiptaPaul7
 
Computer Networking fundamentals
Computer Networking fundamentals Computer Networking fundamentals
Computer Networking fundamentals
Kirti Verma
 
Computer networking
Computer networkingComputer networking
Computer networking
Tapan Khilar
 
PROFESSIONAL SLIDES
PROFESSIONAL SLIDESPROFESSIONAL SLIDES
PROFESSIONAL SLIDES
ABDUL WADOOD ☑
 
Lecture-03 - Introduction To Network.pptx
Lecture-03 - Introduction To Network.pptxLecture-03 - Introduction To Network.pptx
Lecture-03 - Introduction To Network.pptx
Md. Sakhawat Hossain
 
Class work 2,computer_network_317
Class work 2,computer_network_317Class work 2,computer_network_317
Class work 2,computer_network_317
Khondoker Sadia
 
L1 - Computer Networks Review.pptx
L1 - Computer Networks Review.pptxL1 - Computer Networks Review.pptx
L1 - Computer Networks Review.pptx
MohamedFouardKanu
 
Networking Concepts
Networking ConceptsNetworking Concepts
Networking Concepts
Varun Chauhan
 
Rkp internet part i
Rkp internet part iRkp internet part i
Rkp internet part i
DR. Ram Kumar Pathak
 
Computer communication network
Computer communication networkComputer communication network
Computer communication network
himz676987
 
Computer Networking concepts
Computer Networking conceptsComputer Networking concepts
Computer Networking concepts
Mujeeb Ahmad
 
Networks and telecommunication technologies basics
Networks and telecommunication technologies basicsNetworks and telecommunication technologies basics
Networks and telecommunication technologies basics
David Kibuki
 
unit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfunit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdf
shubhangisonawane6
 
Networks
NetworksNetworks

Similar to CN L1 — копия.ppt (20)

Introduction to computer_networks
Introduction to computer_networksIntroduction to computer_networks
Introduction to computer_networks
 
Introduction to computer_networks
Introduction to computer_networksIntroduction to computer_networks
Introduction to computer_networks
 
Introduction to computer_networks (unit1)
Introduction to computer_networks (unit1)Introduction to computer_networks (unit1)
Introduction to computer_networks (unit1)
 
Computer network 1
Computer network 1Computer network 1
Computer network 1
 
computer network basic concepets with diagram.pptx
computer network basic concepets with diagram.pptxcomputer network basic concepets with diagram.pptx
computer network basic concepets with diagram.pptx
 
Computer Networking fundamentals
Computer Networking fundamentals Computer Networking fundamentals
Computer Networking fundamentals
 
Computer networking
Computer networkingComputer networking
Computer networking
 
PROFESSIONAL SLIDES
PROFESSIONAL SLIDESPROFESSIONAL SLIDES
PROFESSIONAL SLIDES
 
Lecture-03 - Introduction To Network.pptx
Lecture-03 - Introduction To Network.pptxLecture-03 - Introduction To Network.pptx
Lecture-03 - Introduction To Network.pptx
 
Class work 2,computer_network_317
Class work 2,computer_network_317Class work 2,computer_network_317
Class work 2,computer_network_317
 
L1 - Computer Networks Review.pptx
L1 - Computer Networks Review.pptxL1 - Computer Networks Review.pptx
L1 - Computer Networks Review.pptx
 
Networking Concepts
Networking ConceptsNetworking Concepts
Networking Concepts
 
Hardware1
Hardware1Hardware1
Hardware1
 
Hardware1
Hardware1Hardware1
Hardware1
 
Rkp internet part i
Rkp internet part iRkp internet part i
Rkp internet part i
 
Computer communication network
Computer communication networkComputer communication network
Computer communication network
 
Computer Networking concepts
Computer Networking conceptsComputer Networking concepts
Computer Networking concepts
 
Networks and telecommunication technologies basics
Networks and telecommunication technologies basicsNetworks and telecommunication technologies basics
Networks and telecommunication technologies basics
 
unit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfunit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdf
 
Networks
NetworksNetworks
Networks
 

More from AssemNazirova2

IPv4 adressing
IPv4 adressingIPv4 adressing
IPv4 adressing
AssemNazirova2
 
ICT L13 — копия.pptx
ICT L13 — копия.pptxICT L13 — копия.pptx
ICT L13 — копия.pptx
AssemNazirova2
 
CN L8 — копия.ppt
CN L8 — копия.pptCN L8 — копия.ppt
CN L8 — копия.ppt
AssemNazirova2
 
SDT_L8 — копия.ppt
SDT_L8 — копия.pptSDT_L8 — копия.ppt
SDT_L8 — копия.ppt
AssemNazirova2
 
Cloud technology
Cloud technologyCloud technology
Cloud technology
AssemNazirova2
 
CN L7 — копия.ppt
CN L7 — копия.pptCN L7 — копия.ppt
CN L7 — копия.ppt
AssemNazirova2
 
Лекция 1_ РЭС_Презентация — копия.pptx
Лекция 1_ РЭС_Презентация — копия.pptxЛекция 1_ РЭС_Презентация — копия.pptx
Лекция 1_ РЭС_Презентация — копия.pptx
AssemNazirova2
 
CN L5 — копия.pptx
CN L5 — копия.pptxCN L5 — копия.pptx
CN L5 — копия.pptx
AssemNazirova2
 
physical_layer.pptx
physical_layer.pptxphysical_layer.pptx
physical_layer.pptx
AssemNazirova2
 
Physical.pptx
Physical.pptxPhysical.pptx
Physical.pptx
AssemNazirova2
 
CN L5.pptx
CN L5.pptxCN L5.pptx
CN L5.pptx
AssemNazirova2
 
vlsisubsystemdesignprocessesandillustration-131101063110-phpapp02.pptx
vlsisubsystemdesignprocessesandillustration-131101063110-phpapp02.pptxvlsisubsystemdesignprocessesandillustration-131101063110-phpapp02.pptx
vlsisubsystemdesignprocessesandillustration-131101063110-phpapp02.pptx
AssemNazirova2
 
ICT L5+.pptx
ICT L5+.pptxICT L5+.pptx
ICT L5+.pptx
AssemNazirova2
 
ICT L4.pptx
ICT L4.pptxICT L4.pptx
ICT L4.pptx
AssemNazirova2
 
ICT L2.pptx
ICT L2.pptxICT L2.pptx
ICT L2.pptx
AssemNazirova2
 
HCI.pptx
HCI.pptxHCI.pptx
HCI.pptx
AssemNazirova2
 
E-technology.pptx
E-technology.pptxE-technology.pptx
E-technology.pptx
AssemNazirova2
 
ICT L1 .pptx
ICT L1  .pptxICT L1  .pptx
ICT L1 .pptx
AssemNazirova2
 

More from AssemNazirova2 (18)

IPv4 adressing
IPv4 adressingIPv4 adressing
IPv4 adressing
 
ICT L13 — копия.pptx
ICT L13 — копия.pptxICT L13 — копия.pptx
ICT L13 — копия.pptx
 
CN L8 — копия.ppt
CN L8 — копия.pptCN L8 — копия.ppt
CN L8 — копия.ppt
 
SDT_L8 — копия.ppt
SDT_L8 — копия.pptSDT_L8 — копия.ppt
SDT_L8 — копия.ppt
 
Cloud technology
Cloud technologyCloud technology
Cloud technology
 
CN L7 — копия.ppt
CN L7 — копия.pptCN L7 — копия.ppt
CN L7 — копия.ppt
 
Лекция 1_ РЭС_Презентация — копия.pptx
Лекция 1_ РЭС_Презентация — копия.pptxЛекция 1_ РЭС_Презентация — копия.pptx
Лекция 1_ РЭС_Презентация — копия.pptx
 
CN L5 — копия.pptx
CN L5 — копия.pptxCN L5 — копия.pptx
CN L5 — копия.pptx
 
physical_layer.pptx
physical_layer.pptxphysical_layer.pptx
physical_layer.pptx
 
Physical.pptx
Physical.pptxPhysical.pptx
Physical.pptx
 
CN L5.pptx
CN L5.pptxCN L5.pptx
CN L5.pptx
 
vlsisubsystemdesignprocessesandillustration-131101063110-phpapp02.pptx
vlsisubsystemdesignprocessesandillustration-131101063110-phpapp02.pptxvlsisubsystemdesignprocessesandillustration-131101063110-phpapp02.pptx
vlsisubsystemdesignprocessesandillustration-131101063110-phpapp02.pptx
 
ICT L5+.pptx
ICT L5+.pptxICT L5+.pptx
ICT L5+.pptx
 
ICT L4.pptx
ICT L4.pptxICT L4.pptx
ICT L4.pptx
 
ICT L2.pptx
ICT L2.pptxICT L2.pptx
ICT L2.pptx
 
HCI.pptx
HCI.pptxHCI.pptx
HCI.pptx
 
E-technology.pptx
E-technology.pptxE-technology.pptx
E-technology.pptx
 
ICT L1 .pptx
ICT L1  .pptxICT L1  .pptx
ICT L1 .pptx
 

Recently uploaded

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 

CN L1 — копия.ppt

  • 1. COMPUTER NETWORKS Overview and architecture of computer networks Lecture 1
  • 2. LECTURE CONTENT 1. Definition & applications of computer network 2. Components of computer network 3. Network benefits 4. Disadvantages of computer network 5. Classification by their geographical area 6. Network classification by their component role 7. Types of servers
  • 3. DEFINITION & APPLICATION A computer network is defined as the interconnection of two or more computers. It is done to enable the computers to communicate and share available resources. Applications:  Sharing of resources such as printers  Sharing of expensive software’s and database  Communication from one computer to another computer  Exchange of data and information among users via network  Sharing of information over geographically wide areas.
  • 4. COMPONENTS OF COMPUTER NETWORK  Two or more computers  Cables as links between the computers  A network interfacing card (NIC) on each computer  Switches  Software called operating system (OS)
  • 5. The network provided to the users can be divided into two categories: • Sharing • Connectivity NETWORK BENEFITS
  • 6. Types of resources are: Hardware: A network allows users to share many hardware devices such as printers, modems, fax machines, CD ROM, players, etc. Software: Sharing software resources reduces the cost of software installation, saves space on hard disk. SHARING RESOURCES
  • 7. OTHER BENEFITS OF COMPUTER NETWORK  Increased speed  Reduced cost  Improved security  Centralized software managements  Electronic mail  Flexible access
  • 8. DISADVANTAGES OF NETWORK  High cost of installation  Requires time for administration  Failure of server  Cable faults
  • 9. CLASSIFICATION OF AREA BY THEIR GEOGRAPHY NETWORK PAN LAN WAN MAN CAN
  • 10. LOCAL AREA NETWORK (LAN) LAN is a network which is designed to operate over a small physical area such an office, factory or a group of buildings. LAN’s are easy to design and troubleshoot. Exchange of information and sharing of resources becomes easy because of LAN. In LAN all machines connected to a single cable. Different types of topologies such as star, tree, bus, ring etc. can be used. It is usually a privately owned network.
  • 11. WIDE AREA NETWORK (WAN) When networks span over a large distance of when the computers to be connected to each other are at widely separated locations a local network cannot be used. A wide are network (WAN) is installed. The communication between different users of WAN is established using leased telephone lines, satellite links and similar channels. It is cheaper and more efficient to use the phone network for the link. Most WAN networks are used to transfer large blocks of data between its users.
  • 12. PERSONAL AREA NETWORK (PAN) A personal area network is a computer network organized around an individual person. It generally consists of a mobile computer, a cell phone or personal a digital assistant. PAN enables the communication among these devices. It can also be used for communication among personal devices themselves for connecting to a digital level network and internet. The PAN’s can be constructed using wireless or cables.
  • 13. CAMPUS AREA NETWORK (CAN) The campus area network is made up of an interconnection of LAN with limited geographical area. Network equipment such as switches, routers and the transmission media i.e. optical fibre etc. are almost entirely owned by the campus owner.
  • 14. METROPOLITAN AREA NETWORK (MAN) It is in between LAN & WAN technology that covers the entire city. It is uses similar technology as LAN. It can be a single network such as cable TV network, or a measure of connecting a number of LAN’s or a large networks so that resources can be shared LAN to LAN as well as device to device.
  • 15.
  • 17. NETWORK CLASSIFICATION BY THEIR COMPONENT ROLE
  • 18. PEER TO PEER NETWORK In peer to peer network each computer is responsible for making its own resources available to other computers on the network. Each computer is responsible for setting up and maintaining its own security for these resources. Also each computer is responsible for accessing the required network resources from peer to peer relationships. Peer to peer network is useful for a small network containing less than 10 computers on a single LAN. In peer to peer network each computer can function as both client and server. Peer to peer networks do not have a central control system. There are no servers in peer networks. Peer networks are amplified into home group.
  • 19. ADVENTAGES AND DISADVANTAGES OF PEER TO PEER NETWORK Advantages • Use less expensive computer hardware • Easy to administer • No NOS required • More built in redundancy • Easy setup & low cost Disadvantages • Not very secure • No central point of storage or file archiving • Additional load on computer of resource sharing • Hard to maintain version control
  • 20.
  • 21. CLIENT/SERVER NETWORK In client-server network relationships, certain computers act as server and other act as client. A server is simply a computer, that available the network resources and provides service to other computers when they request it. A client is the computer running a program that requests the service from a server. Local are network (LAN) is based on client server network relationship. A client-server network is one on which all available network resources such as files, directories, applications and shared devices, are centrally managed and hosted and then are accessed by client. Client serve network are defined by the presence of servers on a network that provide security and administration of the network.
  • 22. ADVENTAGES AND DISADVANTAGES OF CLIENT- SERVER NETWORK Advantages • Very secure • Better performance • Centralized backup • Very reliable Disadvantages • Requires professional administration • More hardware intensive • More software intensive • Expensive dedicated
  • 24. TYPES OF SERVERS File server: These servers provide the services for storing, retrieving and moving the data. A user can read, write, exchange and manage the files with the help of file servers. Printer server: The printer server is used for controlling and managing printing on the network. It also offers the fax service to the network users. Application server: The expensive software and additional computing power can be shared by the computers in a network with the help of application servers. Message server: It is used to co-ordinate the interaction between users, documents and application. The data can be used for audio, video, binary, text or graphic. Database server: It is a type of application server. It allows the users to access the centralized strong database.
  • 25. CONTROL QUESTIONS What is computer network (CN)? What are the main components of CN? What is hardware/software? For what purposes is LAN/WAN used for? How does network classified by their component role? What is the differences between peer to peer and client server network?