SlideShare a Scribd company logo
A PRESENTATION ON

COMPUTER
NETWORK
COMPUTER NETWORK

A computer network is a collection of computers and other
hardware interconnected by communication channels that allow sharing of
resources and information. Where at least one process in one device is able
to send/receive data to/from at least one process residing in a remote
device, then the two devices are said to be in a network. A network is a
group of devices connected to each other.
A NETWORK
Communication protocols define the rules and data
formats for exchanging information in a computer network, and
provide the basis for network programming. Well-known
communications protocols include two Ethernet, a hardware and
link layer standard in local area networks, and the Internet protocol
suite which defines a set of protocols for internetworking, i.e. for
data communication between multiple networks, as well as hostto-host data transfer, and application-specific data transmission
formats.
Properties
Computer networks:
1. Facilitate communications
Using a network, people can communicate efficiently and easily via email, chat rooms,
telephone, video-calls, and video conferencing.
2. sharing of files, data, and other types of
information
In a network, authorized users may access data and information stored on other
computers on the network.
3. Share network and computing resources
In a networked, each computer on a network may access devices on the network, such
as printing a document on a network printer.
4. Share network and computing resources
In a networked environment, each computer on a network may access and
use resources provided by devices on the network, such as printing a
document on a shared network printer.
5. May be insecure
A computer network may be used by computer hackers to deploy
computer viruses or computer worms on devices connected to the
network, or to prevent these devices from normally accessing the network
6. May be difficult to set up
A complex computer network may be difficult to set up. It may also be very
costly to set up an effective computer network in a large organization or
company
WIRED TECHNOLOGIES
• Twisted Pair-wire is the most widely used medium for telecommunication. Twistedpair cabling consist of copper wires that are twisted into pairs. Ordinary telephone
wires consist of two insulated copper wires twisted into pairs.
•Coaxial Cable is widely used for cable television systems, office buildings, and other
work-sites for local area networks. Transmission speed ranges from 200 million bits
per second to more than 500 million bits per second.
WIRELESS TECHNOLOGY
•Terrestrial MicrowavE – Terrestrial microwave communication uses Earth-based
transmitters and receivers resembling satellite dishes. Terrestrial microwaves are in the
low-gigahertz range. Relay stations are spaced approximately 48 km (30 mi) apart.
•Communications satellites – The satellites communicate via radio waves, which are not
deflected by the Earth's atmosphere. The satellites are stationed in space typically
about 35,400 above the equator. These Earth-orbiting systems are capable of receiving
and relaying voice, data, and TV signals.
•Cellular and PCS systems use several radio communications technologies. The systems
divide the region covered into multiple geographic areas. Each area has a low-power
transmitter or radio relay antenna device to relay calls from one area to the next area.
LOCAL AREA NETWORK
A Local Area Network (LAN) is a network that connects computers
and devices in a limited geographical area such as home, school, computer
laboratory, office building, or closely positioned group of buildings. Each
computer or device on the network is a node. Current wired LANs are most
likely to be based on Ethernet technology, although new standards like ITU_T
also provide a way to create a wired LAN using existing home wires (coaxial
cables, phone lines and power lines). LAN technologies operate at data
transfer rates up to 10 G bit/s.
WIDE AREA NETWORK

A Wide Area Network(WAN) is a computer network that covers a
large geographic area such as a city, country, or spans even intercontinental
distances, using a communications channel that combines many types of
media such as telephone lines, cables, and air waves. A WAN often uses
transmission facilities provided by common carriers, such as telephone
companies. WAN technologies generally function at the lower three layers of
the OSI reference model: the physical layer, the data link layer, and the
network layer.
INTERNETWORK

An Internetwork is the connection of multiple computer
networks via a common routing technology using routers. The
Internetwork is an aggregation of many connected internetworks
spanning the Earth.
REPEATERS AND HUBS
A Repeater is an electronic device that receives a signal, cleans it
of unnecessary noise, regenerates it, and retransmits it at a higher power
level, or to the other side of an obstruction, so that the signal can cover
longer distances without degradation. In most twisted pair Ethernet
configurations, repeaters are required for cable that runs longer than 100
meters. A repeater with multiple ports is known as a HUB. This can cause a
prapogation-delay which can affect network communication when there
are several repeaters in a row. Many network architectures limit the
number of repeaters that can be used in a row
Today, repeaters and hubs have been made mostly obsolete by switches
NETWORK SECURITY
In the field of networking, the area of network security consists of the
provisions and policies adopted by the network administrator to prevent and monitor
unauthorixed access, misuse, modification, or denial of the computer network and
network-accessible resources. Network security is the authorization of access to data
in a network, which is controlled by the network administrator. Users are assigned an
ID and password that allows them access to information and programs within their
authority. Network Security covers a variety of computer networks, both public and
private that are used in everyday jobs conducting transactions and communications
among businesses, government agencies and individuals.
END

More Related Content

What's hot

Computer Networking
Computer NetworkingComputer Networking
Computer Networking
kieshore
 
types of networks
types of networkstypes of networks
types of networks
rdacs14
 
Computer Networking.
Computer Networking.Computer Networking.
Computer Networking.
mvenkat2016
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
Rajet Veshin
 
Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic concepts
rahul kapoliya
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
Manjit Chavda
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingKhan Rahimeen
 
Network topology
Network topologyNetwork topology
Network topology
vorgalarevathi
 
Types of Computer Network
Types of Computer NetworkTypes of Computer Network
Types of Computer Network
Mohit Dasariya
 
Computer networks and its components by narender singh sandhu
Computer networks and its components by narender singh sandhuComputer networks and its components by narender singh sandhu
Computer networks and its components by narender singh sandhu
NarenderSinghSandhu2
 
NETWORK COMPONENTS
NETWORK COMPONENTSNETWORK COMPONENTS
NETWORK COMPONENTS
bwire sedrick
 
Network Basics
Network BasicsNetwork Basics
Network Basics
tmavroidis
 
Networking concepts
Networking conceptsNetworking concepts
Networking conceptsritajindal2
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
Nayan Dagliya
 
Network and types of network
Network and types of networkNetwork and types of network
Network and types of network
vivek jain
 
Network devices
Network devicesNetwork devices
Network devices
Aryan Kabra
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
Nitin16498
 
Networking devices
Networking devicesNetworking devices
Networking devices
Mubassir Ambekar
 
Computer network
Computer networkComputer network
Computer network
ABHINANDAN Lalit
 
The Basics of Computer Networking
The Basics of Computer NetworkingThe Basics of Computer Networking
The Basics of Computer Networking
Global Knowledge Training
 

What's hot (20)

Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
types of networks
types of networkstypes of networks
types of networks
 
Computer Networking.
Computer Networking.Computer Networking.
Computer Networking.
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic concepts
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
Network topology
Network topologyNetwork topology
Network topology
 
Types of Computer Network
Types of Computer NetworkTypes of Computer Network
Types of Computer Network
 
Computer networks and its components by narender singh sandhu
Computer networks and its components by narender singh sandhuComputer networks and its components by narender singh sandhu
Computer networks and its components by narender singh sandhu
 
NETWORK COMPONENTS
NETWORK COMPONENTSNETWORK COMPONENTS
NETWORK COMPONENTS
 
Network Basics
Network BasicsNetwork Basics
Network Basics
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
 
Network and types of network
Network and types of networkNetwork and types of network
Network and types of network
 
Network devices
Network devicesNetwork devices
Network devices
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Computer network
Computer networkComputer network
Computer network
 
The Basics of Computer Networking
The Basics of Computer NetworkingThe Basics of Computer Networking
The Basics of Computer Networking
 

Viewers also liked

A presentation on computer software
A presentation on computer software A presentation on computer software
A presentation on computer software
Jitendra Kumar
 
computer software
computer softwarecomputer software
computer software
Aftab Badshah
 
Mobile OS Computer presentation
Mobile OS Computer presentationMobile OS Computer presentation
Mobile OS Computer presentationMd Rabius Sany
 
advantages and disadvantages of computer
advantages and disadvantages  of computeradvantages and disadvantages  of computer
advantages and disadvantages of computer
Abhishek Panda
 
Computer presentation
Computer presentationComputer presentation
Computer presentation
Faseeha Sajid
 
Presentation on computer language
Presentation on computer languagePresentation on computer language
Presentation on computer language
Swarnima Tiwari
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virusYogesh Singh Rawat
 

Viewers also liked (7)

A presentation on computer software
A presentation on computer software A presentation on computer software
A presentation on computer software
 
computer software
computer softwarecomputer software
computer software
 
Mobile OS Computer presentation
Mobile OS Computer presentationMobile OS Computer presentation
Mobile OS Computer presentation
 
advantages and disadvantages of computer
advantages and disadvantages  of computeradvantages and disadvantages  of computer
advantages and disadvantages of computer
 
Computer presentation
Computer presentationComputer presentation
Computer presentation
 
Presentation on computer language
Presentation on computer languagePresentation on computer language
Presentation on computer language
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 

Similar to Computer Network

Computer Networks
Computer NetworksComputer Networks
Computer Networks
Mark Rotondella
 
Computer network theory
Computer network theoryComputer network theory
Computer network theory
sheikhparvez4
 
Computer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.pptComputer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.ppt
mv9499596
 
Basic in Computernetwork
Basic in ComputernetworkBasic in Computernetwork
Basic in Computernetwork
suraj pandey
 
final NEtworking.pptx
final  NEtworking.pptxfinal  NEtworking.pptx
final NEtworking.pptx
HardeepKaurCSEAssist
 
Network ppt
Network pptNetwork ppt
Network ppt
hlalu861
 
Communication technology
Communication technologyCommunication technology
Communication technologyAustinSabu
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
seemadav1
 
Networkingfundamentals
NetworkingfundamentalsNetworkingfundamentals
Networkingfundamentals
Sithu PM
 
Networking
NetworkingNetworking
Networking
Joseph Zacharia
 
Lan, man and wan ppt final
Lan, man and wan ppt finalLan, man and wan ppt final
Lan, man and wan ppt finalArushi Garg
 
Data Communication and Computer Network Overview
Data Communication and Computer Network Overview Data Communication and Computer Network Overview
Data Communication and Computer Network Overview
RANVIJAY GAUR
 
Computer Networking - Complete Resume Guide
Computer Networking - Complete Resume GuideComputer Networking - Complete Resume Guide
Computer Networking - Complete Resume Guide
zcorpio
 
Computer network
Computer networkComputer network
Computer network
SharminSultana103
 
Networking hardware
Networking hardwareNetworking hardware
Networking hardware
fun computing
 
network.pdf
network.pdfnetwork.pdf
network.pdf
LakshayTyagi28
 
Networking and telecommunication.pptx
Networking and telecommunication.pptxNetworking and telecommunication.pptx
Networking and telecommunication.pptx
sanskritisubedi2007
 

Similar to Computer Network (20)

A computer network
A computer networkA computer network
A computer network
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Computer network theory
Computer network theoryComputer network theory
Computer network theory
 
Computer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.pptComputer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.ppt
 
Basic in Computernetwork
Basic in ComputernetworkBasic in Computernetwork
Basic in Computernetwork
 
final NEtworking.pptx
final  NEtworking.pptxfinal  NEtworking.pptx
final NEtworking.pptx
 
Network ppt
Network pptNetwork ppt
Network ppt
 
Communication technology
Communication technologyCommunication technology
Communication technology
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
Networking fundamentals (1)
Networking fundamentals (1)Networking fundamentals (1)
Networking fundamentals (1)
 
Networkingfundamentals
NetworkingfundamentalsNetworkingfundamentals
Networkingfundamentals
 
Networking
NetworkingNetworking
Networking
 
Itm 4
Itm 4Itm 4
Itm 4
 
Lan, man and wan ppt final
Lan, man and wan ppt finalLan, man and wan ppt final
Lan, man and wan ppt final
 
Data Communication and Computer Network Overview
Data Communication and Computer Network Overview Data Communication and Computer Network Overview
Data Communication and Computer Network Overview
 
Computer Networking - Complete Resume Guide
Computer Networking - Complete Resume GuideComputer Networking - Complete Resume Guide
Computer Networking - Complete Resume Guide
 
Computer network
Computer networkComputer network
Computer network
 
Networking hardware
Networking hardwareNetworking hardware
Networking hardware
 
network.pdf
network.pdfnetwork.pdf
network.pdf
 
Networking and telecommunication.pptx
Networking and telecommunication.pptxNetworking and telecommunication.pptx
Networking and telecommunication.pptx
 

Recently uploaded

Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 

Recently uploaded (20)

Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 

Computer Network

  • 2. COMPUTER NETWORK A computer network is a collection of computers and other hardware interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. A network is a group of devices connected to each other.
  • 4. Communication protocols define the rules and data formats for exchanging information in a computer network, and provide the basis for network programming. Well-known communications protocols include two Ethernet, a hardware and link layer standard in local area networks, and the Internet protocol suite which defines a set of protocols for internetworking, i.e. for data communication between multiple networks, as well as hostto-host data transfer, and application-specific data transmission formats.
  • 5. Properties Computer networks: 1. Facilitate communications Using a network, people can communicate efficiently and easily via email, chat rooms, telephone, video-calls, and video conferencing. 2. sharing of files, data, and other types of information In a network, authorized users may access data and information stored on other computers on the network. 3. Share network and computing resources In a networked, each computer on a network may access devices on the network, such as printing a document on a network printer.
  • 6. 4. Share network and computing resources In a networked environment, each computer on a network may access and use resources provided by devices on the network, such as printing a document on a shared network printer. 5. May be insecure A computer network may be used by computer hackers to deploy computer viruses or computer worms on devices connected to the network, or to prevent these devices from normally accessing the network 6. May be difficult to set up A complex computer network may be difficult to set up. It may also be very costly to set up an effective computer network in a large organization or company
  • 7. WIRED TECHNOLOGIES • Twisted Pair-wire is the most widely used medium for telecommunication. Twistedpair cabling consist of copper wires that are twisted into pairs. Ordinary telephone wires consist of two insulated copper wires twisted into pairs. •Coaxial Cable is widely used for cable television systems, office buildings, and other work-sites for local area networks. Transmission speed ranges from 200 million bits per second to more than 500 million bits per second.
  • 8.
  • 9. WIRELESS TECHNOLOGY •Terrestrial MicrowavE – Terrestrial microwave communication uses Earth-based transmitters and receivers resembling satellite dishes. Terrestrial microwaves are in the low-gigahertz range. Relay stations are spaced approximately 48 km (30 mi) apart. •Communications satellites – The satellites communicate via radio waves, which are not deflected by the Earth's atmosphere. The satellites are stationed in space typically about 35,400 above the equator. These Earth-orbiting systems are capable of receiving and relaying voice, data, and TV signals. •Cellular and PCS systems use several radio communications technologies. The systems divide the region covered into multiple geographic areas. Each area has a low-power transmitter or radio relay antenna device to relay calls from one area to the next area.
  • 10.
  • 11. LOCAL AREA NETWORK A Local Area Network (LAN) is a network that connects computers and devices in a limited geographical area such as home, school, computer laboratory, office building, or closely positioned group of buildings. Each computer or device on the network is a node. Current wired LANs are most likely to be based on Ethernet technology, although new standards like ITU_T also provide a way to create a wired LAN using existing home wires (coaxial cables, phone lines and power lines). LAN technologies operate at data transfer rates up to 10 G bit/s.
  • 12.
  • 13. WIDE AREA NETWORK A Wide Area Network(WAN) is a computer network that covers a large geographic area such as a city, country, or spans even intercontinental distances, using a communications channel that combines many types of media such as telephone lines, cables, and air waves. A WAN often uses transmission facilities provided by common carriers, such as telephone companies. WAN technologies generally function at the lower three layers of the OSI reference model: the physical layer, the data link layer, and the network layer.
  • 14.
  • 15. INTERNETWORK An Internetwork is the connection of multiple computer networks via a common routing technology using routers. The Internetwork is an aggregation of many connected internetworks spanning the Earth.
  • 16. REPEATERS AND HUBS A Repeater is an electronic device that receives a signal, cleans it of unnecessary noise, regenerates it, and retransmits it at a higher power level, or to the other side of an obstruction, so that the signal can cover longer distances without degradation. In most twisted pair Ethernet configurations, repeaters are required for cable that runs longer than 100 meters. A repeater with multiple ports is known as a HUB. This can cause a prapogation-delay which can affect network communication when there are several repeaters in a row. Many network architectures limit the number of repeaters that can be used in a row Today, repeaters and hubs have been made mostly obsolete by switches
  • 17.
  • 18. NETWORK SECURITY In the field of networking, the area of network security consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorixed access, misuse, modification, or denial of the computer network and network-accessible resources. Network security is the authorization of access to data in a network, which is controlled by the network administrator. Users are assigned an ID and password that allows them access to information and programs within their authority. Network Security covers a variety of computer networks, both public and private that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals.
  • 19.
  • 20. END