SlideShare a Scribd company logo
GURU HARKRISHAN
PUBLIC SCHOOL
NETWORKING
CONCEPTS
CLASS .
VIII
LEARNING IN THIS
MODULE:
1. Introduction of
computer network.
2. Advantages of
networking
3. Networking Media
4. Types Of Network
5. Networking Devices
6. Networking Terminology
7. Protocols
A computer network can
be defined as a group of
networks and other
peripheral devices that
are linked together for
the purpose of sharing
data and hardware
resources.
EXAMPLE OF COMPUTER
NETWORK
The computers in a network can
communicate with each other as well
as work independently. Each
computer in a network is called a
Node. One of these nodes acts as a
Sender that transmits the information
to other nodes in a network known as
Receivers.
These computers are linked with
each other through some medium
such as cables, telephone lines,
radio waves etc.
COMPUTER NETWORK AS A
DATA COMMUNICATION
SIGNAL
It consists of the following parts:
1. Message – It is the information to be
communicated.
2. Sender – Sender is a device that sends message.
3. Receiver – Receiver is a device that receives
message.
4. Transmission Medium – It is the physical path
through which the message travels from the sender to
receiver.
5. Protocol – A protocol specifies a set of rules that
governs the data communication.
ADVANTAGES OF
NETWORKING
Efficient use of
storage media
Quickest
document
delivery
Redudancy Efficiency
Advantages
of
networking
NETWORKING MEDIA
WIRED NETWORKING
TECHNOLOGY
WIRELESS NETWORKING
TECHNOLOGY
WIRED NETWORKING TECHNOLOGY
Ethernet Cables
Coaxial Cable
Optical Fibre Cable
WIRELESS NETWORKING TECHNOLOGY
Bluetooth
Infrared
Wi-Fi (Wireless Fidelity)
TYPES OF NETWORKS
LAN (LOCAL AREA
NETWORK)
A local area network
(LAN) is a group of
computers and
associated devices that
share a common
communications line or
wireless link to a server.
PAN (PERSONAL
AREA NETWORK)
A personal area
network (PAN) is a
computer network for
interconnecting devices
centered on an
individual person's
workspace.
MAN
(METROPOLITAN
AREA NETWORK)
A metropolitan area network
(MAN) is a network that
interconnects users with
computer resources in a
geographic area or region larger
than that covered by even a
large local area network (LAN)
but smaller than the area
covered by a wide area network
(WAN).
WAN (WIDE AREA
NETWORK)
A wide area network is
a telecommunications
network that extends
over a large
geographical distance
for the primary
purpose of computer
networking.
Networking devices are the
hardware devices used to
connect computers or other
electronic devices together in
order to share files or
resources like printers or fax
machine.
MODEM
A modem enables you to connect your
computer to the available computer
connection over the existing telephone
lines. It cpnverts the digital signals of a
computer into analog signals to enable
their transmission via phone lines.
Modems are available in two categories:
Internal Modem and External Modem.
MODEM
SWITCH
Switches contain many
ports to connect different
network segments. They
are similar to hubs, but
offer greater performance.
A switch is aware of the
SWITCH
cont
HUB
A hub is the networking device that is
used to connect multiple computers
and computing devices directly to the
network by using cables. Each
connection is called a port. A hub
sends all the data it receive to all the
connected ports.
HUB
REPEATER
A repeater is a communication
device used to regenerate a signal. It
receives electronic signals, cleans
them and retransmits them.
Repeaters are needed so that the
signals can travel distances with the
same strength or even at a higher
strength.
REPEATER
ROUTER
A router is a communication
device that is used to connect
two different networks, such as
two LANs, or a LAN and a
WAN. It plays a vital role in
controlling the traffic and
keeping the network efficient.
ROUTER
GATEWAY
A gateway is a network point that acts as an entrance to
another network using different protocols. It allows us
to cvarryout various online activities such as sending e-
mail, buying things onine etc. It is a shared connection
between LAN and WAN.
GATEWAY
NETWORKING
TERMINOLOGY
INTERNET
The internet is the global wide
area network that connects
computer system across the
world. It provides a variety of
information and communication
facilities.
BANDWIDTH
Bandwidth is the amount of
data that can be transmitted
in a fixed amount of time. The
bandwidth is usually expressed
in bits per second(bps) or
bytes per second or a higher
units like kilobytes(kbps) and
megabyte per second(mbps).
INTERNET SERVICE PROVIDER
(ISP)
THESE ARE THE
ORGANIZATIONS THAT
PROVIDE INTERNET
CONNECTION TO USERS. THE
FACILITY IS PROVIDED TO THE
CUSTOMERS IN EXCHANGE FOR
A FEE.
AN ISP DIAGRAM
COMMON ISP PROVIDER
IN INDIA
www.pinterest.com
www.quora.com
www.wikipedia.org
www.mycbseguide.com
www.amazon.in
Etc.
WEB PORTAL
WEBPAGE HOMEPAGE
A webpage is
written using
HTML and is
stored on a
web server. It
is digital page
which may
contain text,
hyperlink,
videos, audios
etc.
It is the first
page of
website. It
contains the
main
information
about the
website along
links to other
parts of the
website.
LINK – In data communication, a link
is a line or channel that connects two
devices. Data is transmitted between
the connected devices through this
channel.
In computing, a hyperlink, or simply a
link, is a reference to data that the
reader can follow by clicking or
tapping. A hyperlink points to a whole
document or to a specific element
HYPERTEXT-
Hypertext is text displayed on a
computer display or other electronic
devices with references to other text
that the reader can immediately
access. Hypertext documents are
interconnected by hyperlinks, which
are typically activated by a mouse
IP ADDRESS(NUMBER
ADDRESSING SYSTEM)
An IP address (internet
protocol address) is a numerical
representation that uniquely identifies a
specific interface on the
network. Addresses in IPv4are 32-bits
long. This allows for a maximum of
4,294,967,296 (232) unique addresses.
INTERNET PROTOCOL
ADDRESS (IP ADDRESS)
Domain name is a unique name given to
each website or resource connected to the
internet. Domain names are easier to
remember than IP address.
TCP/IP( TRANSMISSION
CONTROL/INTERNET PROTOCOL
Internet protocol is a suite of
communication protocols used to
connect various computers on the
Internet. It provides end-to-end data
communication specifying how data
should be broken into pieces called
packets, transmitted and routed from
one network to another.
HTTP or Hyper Text Transfer Control
determines how different forms of information
get transferred to your screen over the Internet.
This protocol also defines what action web
servers and browsers should take in response to
various commands.
HYPER TEXT TRANSFER
PROTOCOL
HTTP
Request Message
HTTP
Response Message
Working of HTTP
FTP or File Transfer Protocol is a
standard Internet protocol. It is
one of the simplest and easiest way
two exchange files between two or
more computers on the Internet,
using FTP client and FTP server
softwre.
THE FILE TRANSFER
PROTOCOL WAS
ORIGINALLY DESIGNED
BY ABHAY BHUSHAN AND
PUBLISHED IN 1971.
IMAP AND POP
IMAP (INTERNET MESSAGE ACCESS PROTOCOL) and POP
(POST POFFICE PROTOCOL) are the two most popular Internet
standard protocols for retrieving e-mails. SMTP is the sending
protocol and POP are the receiving protocol.
Computer network

More Related Content

What's hot

Computer Network
Computer NetworkComputer Network
Computer NetworkCma Mohd
 
Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic concepts
rahul kapoliya
 
Networking concepts
Networking conceptsNetworking concepts
Networking conceptsritajindal2
 
Networking devices
Networking devicesNetworking devices
Networking devices
university of Gujrat, pakistan
 
Network Interface Card
Network Interface CardNetwork Interface Card
Network Interface Card
sourabh4u07
 
Data Communication and Networking
Data Communication and NetworkingData Communication and Networking
Data Communication and Networking
Anjan Mahanta
 
Network Topology
Network TopologyNetwork Topology
Network Topology
Swapna Subhadarsini
 
Introduction Wireless Technology
Introduction Wireless TechnologyIntroduction Wireless Technology
Introduction Wireless Technology
priyankpatel2811
 
Computer networking ppt
Computer networking pptComputer networking ppt
Computer networking ppt
Jitender Kumar
 
Basics of Networks ,Advantages and Disadvantages
Basics of  Networks ,Advantages and DisadvantagesBasics of  Networks ,Advantages and Disadvantages
Basics of Networks ,Advantages and Disadvantages
sabari Giri
 
Network switch
Network switchNetwork switch
Network switch
Ravinder Kaur
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentalsjpprakash
 
wired and wireless networks
wired and wireless networkswired and wireless networks
wired and wireless networks
Kavitha Ravi
 
networking device router,switches & bridges
networking device router,switches & bridgesnetworking device router,switches & bridges
networking device router,switches & bridges
keyur Nandaniya
 
Network devices
Network devicesNetwork devices
Network devices
Dhani Ahmad
 
Cellular network presentation
Cellular network presentationCellular network presentation
Cellular network presentationAditya Pandey
 
PPT Backbone And Networks
PPT Backbone And NetworksPPT Backbone And Networks
PPT Backbone And Networks
kishorekommu kommu
 
Topology presentation-sachin noire
Topology presentation-sachin noireTopology presentation-sachin noire
Topology presentation-sachin noire
sachin kumar
 

What's hot (20)

Computer Network
Computer NetworkComputer Network
Computer Network
 
Computer network
Computer networkComputer network
Computer network
 
Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic concepts
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Network Interface Card
Network Interface CardNetwork Interface Card
Network Interface Card
 
Data Communication and Networking
Data Communication and NetworkingData Communication and Networking
Data Communication and Networking
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Introduction Wireless Technology
Introduction Wireless TechnologyIntroduction Wireless Technology
Introduction Wireless Technology
 
Computer networking ppt
Computer networking pptComputer networking ppt
Computer networking ppt
 
Basics of Networks ,Advantages and Disadvantages
Basics of  Networks ,Advantages and DisadvantagesBasics of  Networks ,Advantages and Disadvantages
Basics of Networks ,Advantages and Disadvantages
 
Network switch
Network switchNetwork switch
Network switch
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentals
 
wired and wireless networks
wired and wireless networkswired and wireless networks
wired and wireless networks
 
networking device router,switches & bridges
networking device router,switches & bridgesnetworking device router,switches & bridges
networking device router,switches & bridges
 
Network devices
Network devicesNetwork devices
Network devices
 
Cellular network presentation
Cellular network presentationCellular network presentation
Cellular network presentation
 
PPT Backbone And Networks
PPT Backbone And NetworksPPT Backbone And Networks
PPT Backbone And Networks
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Topology presentation-sachin noire
Topology presentation-sachin noireTopology presentation-sachin noire
Topology presentation-sachin noire
 

Similar to Computer network

JEG-G4.pptx
JEG-G4.pptxJEG-G4.pptx
JEG-G4.pptx
LemuelCondes4
 
network.pdf
network.pdfnetwork.pdf
network.pdf
LakshayTyagi28
 
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSENETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
TENZING LHADON
 
Introduction To Computer Networks
Introduction To Computer Networks Introduction To Computer Networks
Introduction To Computer Networks
AfsanaAkterRubi
 
Networking concepts by Sachidananda M H
Networking concepts by Sachidananda M HNetworking concepts by Sachidananda M H
Networking concepts by Sachidananda M H
Sachidananda M H
 
Computer book.pptx
Computer book.pptxComputer book.pptx
Computer book.pptx
Aditisingh87803
 
A Network Of Networks For Slide Share
A Network Of Networks For Slide ShareA Network Of Networks For Slide Share
A Network Of Networks For Slide Share
itsvineeth209
 
COMPUTER NETWORKS
COMPUTER NETWORKSCOMPUTER NETWORKS
COMPUTER NETWORKS
abiramiabi21
 
NT BY AKATSUKI.pdf E
NT BY AKATSUKI.pdf                              ENT BY AKATSUKI.pdf                              E
NT BY AKATSUKI.pdf E
prajapatidev644
 
IARE_CN_PPT_0 (1).pdf
IARE_CN_PPT_0 (1).pdfIARE_CN_PPT_0 (1).pdf
IARE_CN_PPT_0 (1).pdf
DebaComedyClub
 
Computer network
Computer networkComputer network
Computer network
Md Saylab
 
COMPUTER NETWORKS.pptx
COMPUTER NETWORKS.pptxCOMPUTER NETWORKS.pptx
COMPUTER NETWORKS.pptx
varunvigneshprabhaka
 
Data Communication and Computer Network Overview
Data Communication and Computer Network Overview Data Communication and Computer Network Overview
Data Communication and Computer Network Overview
RANVIJAY GAUR
 
Data Communication & Network
Data Communication & NetworkData Communication & Network
Data Communication & Network
Maulen Bale
 
Computer network assignment help
Computer network assignment helpComputer network assignment help
Computer network assignment help
Jacob William
 
Computer network
Computer networkComputer network
Computer network
tanvirahmed638
 
Terminologies used with networking
Terminologies used with networkingTerminologies used with networking
Terminologies used with networkingchamwama
 
Bab3-computer network
Bab3-computer networkBab3-computer network
Bab3-computer networkAten Kecik
 
Introduction of computer networks
Introduction of computer networksIntroduction of computer networks
Introduction of computer networks
AlidHasan4
 

Similar to Computer network (20)

JEG-G4.pptx
JEG-G4.pptxJEG-G4.pptx
JEG-G4.pptx
 
network.pdf
network.pdfnetwork.pdf
network.pdf
 
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSENETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
 
Introduction To Computer Networks
Introduction To Computer Networks Introduction To Computer Networks
Introduction To Computer Networks
 
Networking concepts by Sachidananda M H
Networking concepts by Sachidananda M HNetworking concepts by Sachidananda M H
Networking concepts by Sachidananda M H
 
Computer book.pptx
Computer book.pptxComputer book.pptx
Computer book.pptx
 
A Network Of Networks For Slide Share
A Network Of Networks For Slide ShareA Network Of Networks For Slide Share
A Network Of Networks For Slide Share
 
COMPUTER NETWORKS
COMPUTER NETWORKSCOMPUTER NETWORKS
COMPUTER NETWORKS
 
NT BY AKATSUKI.pdf E
NT BY AKATSUKI.pdf                              ENT BY AKATSUKI.pdf                              E
NT BY AKATSUKI.pdf E
 
Fg c
Fg cFg c
Fg c
 
IARE_CN_PPT_0 (1).pdf
IARE_CN_PPT_0 (1).pdfIARE_CN_PPT_0 (1).pdf
IARE_CN_PPT_0 (1).pdf
 
Computer network
Computer networkComputer network
Computer network
 
COMPUTER NETWORKS.pptx
COMPUTER NETWORKS.pptxCOMPUTER NETWORKS.pptx
COMPUTER NETWORKS.pptx
 
Data Communication and Computer Network Overview
Data Communication and Computer Network Overview Data Communication and Computer Network Overview
Data Communication and Computer Network Overview
 
Data Communication & Network
Data Communication & NetworkData Communication & Network
Data Communication & Network
 
Computer network assignment help
Computer network assignment helpComputer network assignment help
Computer network assignment help
 
Computer network
Computer networkComputer network
Computer network
 
Terminologies used with networking
Terminologies used with networkingTerminologies used with networking
Terminologies used with networking
 
Bab3-computer network
Bab3-computer networkBab3-computer network
Bab3-computer network
 
Introduction of computer networks
Introduction of computer networksIntroduction of computer networks
Introduction of computer networks
 

More from ABHINANDAN Lalit

TENSES
TENSESTENSES
CLOUD COMPUTING
CLOUD COMPUTINGCLOUD COMPUTING
CLOUD COMPUTING
ABHINANDAN Lalit
 
Adobe photoshop creative cloud
Adobe photoshop creative cloudAdobe photoshop creative cloud
Adobe photoshop creative cloud
ABHINANDAN Lalit
 
URI "THE SURGICAL STRIKE"
URI "THE SURGICAL STRIKE"URI "THE SURGICAL STRIKE"
URI "THE SURGICAL STRIKE"
ABHINANDAN Lalit
 
congruency of triangles
congruency of trianglescongruency of triangles
congruency of triangles
ABHINANDAN Lalit
 
symmetry for class 7
symmetry for class 7symmetry for class 7
symmetry for class 7
ABHINANDAN Lalit
 
comparing quantities
comparing quantitiescomparing quantities
comparing quantities
ABHINANDAN Lalit
 
exponents and power
exponents and powerexponents and power
exponents and power
ABHINANDAN Lalit
 
FIBRE TO FABRIC
 FIBRE TO FABRIC FIBRE TO FABRIC
FIBRE TO FABRIC
ABHINANDAN Lalit
 

More from ABHINANDAN Lalit (9)

TENSES
TENSESTENSES
TENSES
 
CLOUD COMPUTING
CLOUD COMPUTINGCLOUD COMPUTING
CLOUD COMPUTING
 
Adobe photoshop creative cloud
Adobe photoshop creative cloudAdobe photoshop creative cloud
Adobe photoshop creative cloud
 
URI "THE SURGICAL STRIKE"
URI "THE SURGICAL STRIKE"URI "THE SURGICAL STRIKE"
URI "THE SURGICAL STRIKE"
 
congruency of triangles
congruency of trianglescongruency of triangles
congruency of triangles
 
symmetry for class 7
symmetry for class 7symmetry for class 7
symmetry for class 7
 
comparing quantities
comparing quantitiescomparing quantities
comparing quantities
 
exponents and power
exponents and powerexponents and power
exponents and power
 
FIBRE TO FABRIC
 FIBRE TO FABRIC FIBRE TO FABRIC
FIBRE TO FABRIC
 

Recently uploaded

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 

Recently uploaded (20)

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 

Computer network

  • 3. LEARNING IN THIS MODULE: 1. Introduction of computer network. 2. Advantages of networking 3. Networking Media 4. Types Of Network 5. Networking Devices 6. Networking Terminology 7. Protocols
  • 4. A computer network can be defined as a group of networks and other peripheral devices that are linked together for the purpose of sharing data and hardware resources.
  • 6. The computers in a network can communicate with each other as well as work independently. Each computer in a network is called a Node. One of these nodes acts as a Sender that transmits the information to other nodes in a network known as Receivers.
  • 7. These computers are linked with each other through some medium such as cables, telephone lines, radio waves etc.
  • 8. COMPUTER NETWORK AS A DATA COMMUNICATION SIGNAL
  • 9. It consists of the following parts: 1. Message – It is the information to be communicated. 2. Sender – Sender is a device that sends message. 3. Receiver – Receiver is a device that receives message. 4. Transmission Medium – It is the physical path through which the message travels from the sender to receiver. 5. Protocol – A protocol specifies a set of rules that governs the data communication.
  • 11. Efficient use of storage media Quickest document delivery Redudancy Efficiency Advantages of networking
  • 15. WIRED NETWORKING TECHNOLOGY Ethernet Cables Coaxial Cable Optical Fibre Cable
  • 17.
  • 19.
  • 20. LAN (LOCAL AREA NETWORK) A local area network (LAN) is a group of computers and associated devices that share a common communications line or wireless link to a server.
  • 21. PAN (PERSONAL AREA NETWORK) A personal area network (PAN) is a computer network for interconnecting devices centered on an individual person's workspace.
  • 22. MAN (METROPOLITAN AREA NETWORK) A metropolitan area network (MAN) is a network that interconnects users with computer resources in a geographic area or region larger than that covered by even a large local area network (LAN) but smaller than the area covered by a wide area network (WAN).
  • 23. WAN (WIDE AREA NETWORK) A wide area network is a telecommunications network that extends over a large geographical distance for the primary purpose of computer networking.
  • 24.
  • 25. Networking devices are the hardware devices used to connect computers or other electronic devices together in order to share files or resources like printers or fax machine.
  • 26. MODEM A modem enables you to connect your computer to the available computer connection over the existing telephone lines. It cpnverts the digital signals of a computer into analog signals to enable their transmission via phone lines. Modems are available in two categories: Internal Modem and External Modem.
  • 27. MODEM
  • 28. SWITCH Switches contain many ports to connect different network segments. They are similar to hubs, but offer greater performance. A switch is aware of the
  • 30. cont HUB A hub is the networking device that is used to connect multiple computers and computing devices directly to the network by using cables. Each connection is called a port. A hub sends all the data it receive to all the connected ports.
  • 31. HUB
  • 32. REPEATER A repeater is a communication device used to regenerate a signal. It receives electronic signals, cleans them and retransmits them. Repeaters are needed so that the signals can travel distances with the same strength or even at a higher strength.
  • 34. ROUTER A router is a communication device that is used to connect two different networks, such as two LANs, or a LAN and a WAN. It plays a vital role in controlling the traffic and keeping the network efficient.
  • 36. GATEWAY A gateway is a network point that acts as an entrance to another network using different protocols. It allows us to cvarryout various online activities such as sending e- mail, buying things onine etc. It is a shared connection between LAN and WAN.
  • 39. INTERNET The internet is the global wide area network that connects computer system across the world. It provides a variety of information and communication facilities.
  • 40.
  • 41.
  • 42. BANDWIDTH Bandwidth is the amount of data that can be transmitted in a fixed amount of time. The bandwidth is usually expressed in bits per second(bps) or bytes per second or a higher units like kilobytes(kbps) and megabyte per second(mbps).
  • 43. INTERNET SERVICE PROVIDER (ISP) THESE ARE THE ORGANIZATIONS THAT PROVIDE INTERNET CONNECTION TO USERS. THE FACILITY IS PROVIDED TO THE CUSTOMERS IN EXCHANGE FOR A FEE.
  • 46.
  • 49.
  • 50. WEBPAGE HOMEPAGE A webpage is written using HTML and is stored on a web server. It is digital page which may contain text, hyperlink, videos, audios etc. It is the first page of website. It contains the main information about the website along links to other parts of the website.
  • 51. LINK – In data communication, a link is a line or channel that connects two devices. Data is transmitted between the connected devices through this channel.
  • 52. In computing, a hyperlink, or simply a link, is a reference to data that the reader can follow by clicking or tapping. A hyperlink points to a whole document or to a specific element
  • 53. HYPERTEXT- Hypertext is text displayed on a computer display or other electronic devices with references to other text that the reader can immediately access. Hypertext documents are interconnected by hyperlinks, which are typically activated by a mouse
  • 54.
  • 55.
  • 56.
  • 57. IP ADDRESS(NUMBER ADDRESSING SYSTEM) An IP address (internet protocol address) is a numerical representation that uniquely identifies a specific interface on the network. Addresses in IPv4are 32-bits long. This allows for a maximum of 4,294,967,296 (232) unique addresses.
  • 59. Domain name is a unique name given to each website or resource connected to the internet. Domain names are easier to remember than IP address.
  • 60.
  • 61.
  • 62. TCP/IP( TRANSMISSION CONTROL/INTERNET PROTOCOL Internet protocol is a suite of communication protocols used to connect various computers on the Internet. It provides end-to-end data communication specifying how data should be broken into pieces called packets, transmitted and routed from one network to another.
  • 63. HTTP or Hyper Text Transfer Control determines how different forms of information get transferred to your screen over the Internet. This protocol also defines what action web servers and browsers should take in response to various commands.
  • 66. FTP or File Transfer Protocol is a standard Internet protocol. It is one of the simplest and easiest way two exchange files between two or more computers on the Internet, using FTP client and FTP server softwre.
  • 67. THE FILE TRANSFER PROTOCOL WAS ORIGINALLY DESIGNED BY ABHAY BHUSHAN AND PUBLISHED IN 1971.
  • 68.
  • 69. IMAP AND POP IMAP (INTERNET MESSAGE ACCESS PROTOCOL) and POP (POST POFFICE PROTOCOL) are the two most popular Internet standard protocols for retrieving e-mails. SMTP is the sending protocol and POP are the receiving protocol.