SlideShare a Scribd company logo
STRAND 3
COMMUNICATION NETWORK
SUB-STRAND 1- COMPUTER NETWORKS
INTRODUCTION
• computer network, which is also known as networking is a collection of
network devices such as servers, switch, routers, hub, cables, host and
many more connected to one another to allow sharing of resources. It also
consists of management, maintenance and operation of the network
infrastructure, software and policies.
• Computer network can be put into categories, which include;
• Local Area Network (LAN) covers small geographical area like school
campus
• Wide Area Network (WAN) covers a very large geographical area like
country or continent
• Metropolitan Area Network (MAN) covers large geographical area like city
HARDWARE FOR SETTING UP NETWORK SYSTEM
• Router; device that forwards data packets between computer
networks. It is a central device linking two different networks.
Networking Hardware
router
Networking Hardware- cont’d
• cable: used to connect and transfer data and information between
computers
Networking Hardware- cont’d
cable
Networking Hardware- cont’d
Hub/switch
• Both are devices that allow you to connect multiple PCs to a single
network,
Networking Hardware- cont’d
Server/client
• A server is a computer or system that provides resources, data,
services, or programs to other computers, known as clients. The client
is a computer the request resources from the server.
Networking Hardware- cont’d
Server/client
NETWORK TOPOLOGY
• Network topology refers to how devices on a network are arranged or
connected.
• physical topology: is the physical layout of the connected devices
• logical topology: focuses on the pattern of data transfer between
network nodes.
TYPES OF TOPOLOGY
• Star topology
• In star topology, every node in the network is directly connected to
one central device (hub, switch) via a cable.
TYPES OF TOPOLOGY - cont’d
Bus topology
• Specific kind of network topology in which all of the network devices
are connected to a single cable or line.
TYPES OF TOPOLOGY - cont’d
Ring topology
• In ring topology, nodes are arranged in a circle (or ring), with each
device having exactly two neighbors.
TYPES OF TOPOLOGY - cont’d
mesh topology
• In this type of topology, each computer is connected to every other
computer on the network.
Exercise
• What is network topology?
• Identify the type of network topologies.
• Draw two types of network topology

More Related Content

What's hot

Internetworking devices
Internetworking devicesInternetworking devices
Internetworking devices
Online
 
Networking by Mujahid Hussain
Networking by Mujahid HussainNetworking by Mujahid Hussain
Networking by Mujahid Hussain
Mujahid Hussain Jalbani
 
Network topologies & network devices
Network topologies & network devicesNetwork topologies & network devices
Network topologies & network devices
Annajab
 
Networking Devices and Networking Topologies
Networking Devices and Networking TopologiesNetworking Devices and Networking Topologies
Networking Devices and Networking Topologies
mc aa
 
Network devices
Network devicesNetwork devices
Network devices
Rahul Kushwaha
 
Network devices
Network devicesNetwork devices
Network devices
SUHAILKHAN211
 
Internetworking device
Internetworking deviceInternetworking device
Internetworking device
Ray Mkindo
 
Network (Hub,switches)
Network  (Hub,switches)Network  (Hub,switches)
Network (Hub,switches)
KarthicaMarasamy
 
Networking and internetworking devices
Networking and internetworking devicesNetworking and internetworking devices
Networking and internetworking devices
Raveena kumari
 
Data Communication & computer network: Channel types
Data Communication & computer network: Channel types Data Communication & computer network: Channel types
Data Communication & computer network: Channel types
Dr Rajiv Srivastava
 
NETWORKING PPT
NETWORKING PPTNETWORKING PPT
NETWORKING PPT
VAIBHAV TANWAR
 
Internetworking devices(networking)
Internetworking devices(networking)Internetworking devices(networking)
Internetworking devices(networking)welcometofacebook
 
Networking devices
Networking devicesNetworking devices
Networking devices
Tayyab Hussain
 
Information Technology for Managers - Basics
Information Technology for Managers - BasicsInformation Technology for Managers - Basics
Information Technology for Managers - BasicsAnu Damodaran
 
Network topologies
 Network topologies Network topologies
Network topologies
Kissa e Zahra
 
NETWORKING
NETWORKINGNETWORKING
NETWORKING
junaid abbasi
 
Understanding Networking Devices – A Brief Introduction | TechLinu.com
Understanding Networking Devices – A Brief Introduction | TechLinu.comUnderstanding Networking Devices – A Brief Introduction | TechLinu.com
Understanding Networking Devices – A Brief Introduction | TechLinu.com
TechLinu.com
 
5 Lan
5 Lan5 Lan
Network devices
Network devicesNetwork devices
Network devices
shah baadshah
 
Networking devices(siddique)
Networking devices(siddique)Networking devices(siddique)
Networking devices(siddique)
Siddique Ibrahim
 

What's hot (20)

Internetworking devices
Internetworking devicesInternetworking devices
Internetworking devices
 
Networking by Mujahid Hussain
Networking by Mujahid HussainNetworking by Mujahid Hussain
Networking by Mujahid Hussain
 
Network topologies & network devices
Network topologies & network devicesNetwork topologies & network devices
Network topologies & network devices
 
Networking Devices and Networking Topologies
Networking Devices and Networking TopologiesNetworking Devices and Networking Topologies
Networking Devices and Networking Topologies
 
Network devices
Network devicesNetwork devices
Network devices
 
Network devices
Network devicesNetwork devices
Network devices
 
Internetworking device
Internetworking deviceInternetworking device
Internetworking device
 
Network (Hub,switches)
Network  (Hub,switches)Network  (Hub,switches)
Network (Hub,switches)
 
Networking and internetworking devices
Networking and internetworking devicesNetworking and internetworking devices
Networking and internetworking devices
 
Data Communication & computer network: Channel types
Data Communication & computer network: Channel types Data Communication & computer network: Channel types
Data Communication & computer network: Channel types
 
NETWORKING PPT
NETWORKING PPTNETWORKING PPT
NETWORKING PPT
 
Internetworking devices(networking)
Internetworking devices(networking)Internetworking devices(networking)
Internetworking devices(networking)
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Information Technology for Managers - Basics
Information Technology for Managers - BasicsInformation Technology for Managers - Basics
Information Technology for Managers - Basics
 
Network topologies
 Network topologies Network topologies
Network topologies
 
NETWORKING
NETWORKINGNETWORKING
NETWORKING
 
Understanding Networking Devices – A Brief Introduction | TechLinu.com
Understanding Networking Devices – A Brief Introduction | TechLinu.comUnderstanding Networking Devices – A Brief Introduction | TechLinu.com
Understanding Networking Devices – A Brief Introduction | TechLinu.com
 
5 Lan
5 Lan5 Lan
5 Lan
 
Network devices
Network devicesNetwork devices
Network devices
 
Networking devices(siddique)
Networking devices(siddique)Networking devices(siddique)
Networking devices(siddique)
 

Similar to communication network powerpoint

computer-network.pptx
computer-network.pptxcomputer-network.pptx
computer-network.pptx
BrindhaSenthilKumar3
 
KRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptxKRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptx
ADITYAKUMAR554673
 
Computer networkppt-110208141655-phpapp02
Computer networkppt-110208141655-phpapp02Computer networkppt-110208141655-phpapp02
Computer networkppt-110208141655-phpapp02
DeShawn A. Larkin
 
Web applications and security. By: Partha Jee Chauhan, MSc Computer Science
Web applications and security. By: Partha Jee Chauhan, MSc Computer ScienceWeb applications and security. By: Partha Jee Chauhan, MSc Computer Science
Web applications and security. By: Partha Jee Chauhan, MSc Computer Science
Partha Jee Chauhan
 
B5_WEEK 1_COMPUTER NETWORK.pptx
B5_WEEK 1_COMPUTER NETWORK.pptxB5_WEEK 1_COMPUTER NETWORK.pptx
B5_WEEK 1_COMPUTER NETWORK.pptx
EmmanuelNYAMENAAYE
 
COMPUTER APPLICATIONS Module 3.pptx
COMPUTER APPLICATIONS Module 3.pptxCOMPUTER APPLICATIONS Module 3.pptx
COMPUTER APPLICATIONS Module 3.pptx
Arti Parab Academics
 
Networking presentation
Networking presentationNetworking presentation
Networking presentation
Jyoti Tewari
 
Lecture 1_Introduction to Networking_1.ppt
Lecture 1_Introduction to Networking_1.pptLecture 1_Introduction to Networking_1.ppt
Lecture 1_Introduction to Networking_1.ppt
flyinimohamed
 
Lecture 1 Computer Networks.pptxsecond course
Lecture 1 Computer Networks.pptxsecond courseLecture 1 Computer Networks.pptxsecond course
Lecture 1 Computer Networks.pptxsecond course
LamiyQurbanlKomptert
 
computer networking and its application ppt
computer networking and its application pptcomputer networking and its application ppt
computer networking and its application ppt
Nitesh Dubey
 
Computer network
Computer networkComputer network
Computer network
ASHIK MAHMUD
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer network
Atika Zaimi
 
Computer network updated
Computer network updatedComputer network updated
Computer network updated
King Abidi
 
Presentation-10.pptx
Presentation-10.pptxPresentation-10.pptx
Presentation-10.pptx
ShahinAhmed49
 
info technology.pptx
info technology.pptxinfo technology.pptx
info technology.pptx
ssuser07362a
 
Computer networks
Computer networksComputer networks
Computer networksTej Kiran
 
Computer Networking.pptx
Computer Networking.pptxComputer Networking.pptx
Computer Networking.pptx
Ankita Shirke
 
1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf
sophia763824
 
1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf
JamesOtieno34
 

Similar to communication network powerpoint (20)

computer-network.pptx
computer-network.pptxcomputer-network.pptx
computer-network.pptx
 
KRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptxKRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptx
 
Computer networkppt-110208141655-phpapp02
Computer networkppt-110208141655-phpapp02Computer networkppt-110208141655-phpapp02
Computer networkppt-110208141655-phpapp02
 
Web applications and security. By: Partha Jee Chauhan, MSc Computer Science
Web applications and security. By: Partha Jee Chauhan, MSc Computer ScienceWeb applications and security. By: Partha Jee Chauhan, MSc Computer Science
Web applications and security. By: Partha Jee Chauhan, MSc Computer Science
 
B5_WEEK 1_COMPUTER NETWORK.pptx
B5_WEEK 1_COMPUTER NETWORK.pptxB5_WEEK 1_COMPUTER NETWORK.pptx
B5_WEEK 1_COMPUTER NETWORK.pptx
 
COMPUTER APPLICATIONS Module 3.pptx
COMPUTER APPLICATIONS Module 3.pptxCOMPUTER APPLICATIONS Module 3.pptx
COMPUTER APPLICATIONS Module 3.pptx
 
Networking presentation
Networking presentationNetworking presentation
Networking presentation
 
Lecture 1_Introduction to Networking_1.ppt
Lecture 1_Introduction to Networking_1.pptLecture 1_Introduction to Networking_1.ppt
Lecture 1_Introduction to Networking_1.ppt
 
Lecture 1 Computer Networks.pptxsecond course
Lecture 1 Computer Networks.pptxsecond courseLecture 1 Computer Networks.pptxsecond course
Lecture 1 Computer Networks.pptxsecond course
 
computer networking and its application ppt
computer networking and its application pptcomputer networking and its application ppt
computer networking and its application ppt
 
Computer network
Computer networkComputer network
Computer network
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer network
 
Computer network updated
Computer network updatedComputer network updated
Computer network updated
 
Presentation-10.pptx
Presentation-10.pptxPresentation-10.pptx
Presentation-10.pptx
 
info technology.pptx
info technology.pptxinfo technology.pptx
info technology.pptx
 
Computer networks
Computer networksComputer networks
Computer networks
 
Communications
CommunicationsCommunications
Communications
 
Computer Networking.pptx
Computer Networking.pptxComputer Networking.pptx
Computer Networking.pptx
 
1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf
 
1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 

communication network powerpoint

  • 2. INTRODUCTION • computer network, which is also known as networking is a collection of network devices such as servers, switch, routers, hub, cables, host and many more connected to one another to allow sharing of resources. It also consists of management, maintenance and operation of the network infrastructure, software and policies. • Computer network can be put into categories, which include; • Local Area Network (LAN) covers small geographical area like school campus • Wide Area Network (WAN) covers a very large geographical area like country or continent • Metropolitan Area Network (MAN) covers large geographical area like city
  • 3. HARDWARE FOR SETTING UP NETWORK SYSTEM • Router; device that forwards data packets between computer networks. It is a central device linking two different networks.
  • 5. Networking Hardware- cont’d • cable: used to connect and transfer data and information between computers
  • 7. Networking Hardware- cont’d Hub/switch • Both are devices that allow you to connect multiple PCs to a single network,
  • 8. Networking Hardware- cont’d Server/client • A server is a computer or system that provides resources, data, services, or programs to other computers, known as clients. The client is a computer the request resources from the server.
  • 10. NETWORK TOPOLOGY • Network topology refers to how devices on a network are arranged or connected. • physical topology: is the physical layout of the connected devices • logical topology: focuses on the pattern of data transfer between network nodes.
  • 11. TYPES OF TOPOLOGY • Star topology • In star topology, every node in the network is directly connected to one central device (hub, switch) via a cable.
  • 12. TYPES OF TOPOLOGY - cont’d Bus topology • Specific kind of network topology in which all of the network devices are connected to a single cable or line.
  • 13. TYPES OF TOPOLOGY - cont’d Ring topology • In ring topology, nodes are arranged in a circle (or ring), with each device having exactly two neighbors.
  • 14. TYPES OF TOPOLOGY - cont’d mesh topology • In this type of topology, each computer is connected to every other computer on the network.
  • 15. Exercise • What is network topology? • Identify the type of network topologies. • Draw two types of network topology