This document provides an overview of computer networks, including definitions, components, models, and transmission modes. It defines a computer network as a group of connected devices that share communication channels and resources. The key points are:
- Computer networks use protocols to organize traffic transmitted over wired or wireless pathways between devices.
- The two main network technologies are peer-to-peer and client-server models. Client-server has dedicated servers and clients, while peer-to-peer allows any device to serve or request resources.
- Network topologies include bus, ring, star, mesh, tree and hybrid configurations. Transmission modes are simplex, half-duplex and full-duplex.
group of computers connected with each other to share information or resources. A network can be small or a large. it can be created in a building or spread all over the world. Networks are main source of communication all over the world. The most common resource shared today is connection to the Internet.
group of computers connected with each other to share information or resources. A network can be small or a large. it can be created in a building or spread all over the world. Networks are main source of communication all over the world. The most common resource shared today is connection to the Internet.
This presentation is about a range of computer network that are explained in detail. I recommend you have microsoft powerpoint 2010 or later for smooth running of the presentation. There are also animations in this presentation. Please enjoy, download and follow.
This presentation is about a range of computer network that are explained in detail. I recommend you have microsoft powerpoint 2010 or later for smooth running of the presentation. There are also animations in this presentation. Please enjoy, download and follow.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
2. • Definition
• A computer network is a group of computer systems and other
computing hardware devices that are linked together through
communication channels to facilitate communication and
resource-sharing among a wide range of users.
• Computer networks are made up of wired or wireless
communication pathways that transmit data, voice and video
traffic using protocols to organize traffic.
2
3. • A network must fulfil following criteria.
• Performance
• Reliability
• Security
3
4. • Network Technologies
• The way networks are designed to communicate.
• Types of Network Technologies:
• Peer to Peer and Client/Server
• Peer To Peer Architecture
• A model in which all the computing devices within the network can
function as clients or servers as needed and there's no centralized
control over the network resources.
4
6. 6
●Client Server Architecture
– The Client-Server network model is widely used network
model. Here, Server is a powerful system that stores the data
or information in it and Client is the machine which access
the data on the server.
7. • Important Differences
• The key difference between Client-Server and
Peer-to-Peer network is that there is a dedicated
server and specific clients in the client-server
network model whereas, in peer-to-peer each
node can act as both server and client.
• In the client-server model, the server provides
services to the client. However, in peer-to-peer,
each peer can provide services and can also
request for the services.
7
8. • Important Differences
• In the client-server model, sharing information is
more important whereas, in peer-to-peer model
connectivity between peers is more important.
• In the client-server model, data is stored on a
centralized server whereas, in peer-to-peer each
peer has its own data..
• The client-server model is more expensive to
implement than peer-to-peer.
8
9. • Types of Networks- LAN, MAN and WAN
• 1 Local Area Network(LAN)
• LAN is a computer network that interconnects computers within a
limited area such as a residence, school, or office building.
• LAN can be built with relatively inexpensive hardware, such as hubs,
network adapters and Ethernet cables.
9
10. • 2 Metropolitan Area Network(MAN)
• It can be considered as a larger LAN.
• Typically MAN spans over a city. A Metropolitan Area Network will have
many Local Area Networks Connected.
10
11. • 3 Wide Area Network(WAN)
• A wide area network, or WAN, occupies a very large area, such as an
entire country or the entire world. A WAN can contain multiple smaller
networks, such as LANs or MANs.
• The Internet is the best-known example of a public WAN.
11
13. 13
●NETWORK TOPOLOGY
Topology is the Pattern in which nodes(computers and other
network devices) are connected to form a computer
network.
– Types of Network Topologies are given below.
● BUS,RING, STAR, MESH, Tree and HYBRID .
– BUS Topology
● In this topology, all the nodes (computers as well as
servers) are connected to a single cable (called bus), by
the help of interface connectors. This central cable is the
backbone of the network and is known as Bus. Every
node communicates with other devices through this Bus.
15. 15
Advantages
● It is cost effective.
● Cable required is least compared to other
topologies.
● Used for small networks.
● It is easy to understand.
● Easy to expand joining two cables together.
16. 16
Disadvantages
● If the main bus encounters some problem, whole
network breaks down.
● It is not suitable for networks with heavy traffic.
● There is a limit on central cable length and number
of nodes that can be connected.
● Fault detection and troubleshooting is difficult.
17. • RING Topology
• Here all the nodes are
connected to each-other
forming a loop or RING.
• Each Node is connected
to nodes on either side,
and it communicates
with these two adjacent
neighbours. Data travels
around the network, in
one direction. Sending
and receiving of data
takes place by the help
of TOKEN.
17
18. 18
Advantages
●All data flows in one direction which reduces the chance of
packet collisions.
●Data can transfer between workstations at high speeds.
●Nodes can be added without impacting performance of the
network.
Disadvantages
●Troubleshooting is difficult in ring topology
●Adding or deleting the computers disturbs the network activity.
●Failure of one computer disturbs the whole network.
19. • STAR Topology
• STAR topology is one of the most
common network setups in which
all the nodes are connected to a
central network device(switch, hub
or computer). Here Every node has
its own dedicated connection to
the hub.
19
20. 20
Advantages
●The Network Device(hub/switch/router) can be upgraded
easily.
●Easy to troubleshoot
●Easy to setup and modify.
Disadvantages
●Cost of installation is high.
●If the switch fails then the whole network is disrupted
●More cable length is required
21. • MESH Topology
• It is a point-to-point
connection to other nodes or
devices. All the network nodes
are connected to each other.
• Mesh has n(n-1)/2 physical
channels to link n devices.
•
21
22. 22
Advantages
●Each connection can carry its own data load.
●It is robust
●Easy to troubleshoot
●Provides security and privacy.
Disadvantages
●Installation and configuration is difficult.
●Cabling cost is more.
●More cable length is required
23. 23
TREE Topology
In this Topology, all the computer are connected
like the branches of a tree. In Computer Networking, tree
topology is known as a combination of a Bus and Start network
topology. It is otherwise called star bus topology
24. 24
Advantages
●Easy to expand-(It is flexible and scalable)
●Easily manageable
●Failure of any of the node will not affect whole network.
Disadvantages
●If any problem happened for backbone cable, entire network will
be in trouble.
●Huge amount of Network Cabling is required. Management and
placement of large number of cables is really difficult.
●When more nodes are added, network performance may be
affected.
25. • Hybrid Topology
• It is a combination of two or more
topologies. Hybrid topology Inherits
the advantages and disadvantages of
the topologies included
• The combination of BUS, STAR,
RING or MESH topology constitute
HYBRID topology
25
26. 26
Advantages
●Reliable as Error detection and troubleshooting is easy
●It is an expandable network.
●Effective..
Disadvantages
●Complex Design.
●High Cost
28. 28
●ISO- OSI Reference Model
– ISO-International Standards Organization
– OSI- Open System Interconnection
– Introduced in 1984
– This model has 7 Layers.
● Application Layer
● Presentation Layer
● Session Layer
● Transport Layer
● Network Layer
● Data link Layer
● Physical Layer
30. 30
●Application Layer
– Used by Network Application.
– Protocols used for file transfer(ftp), web
browsing(http, https), email(smtp) etc.
●Presentation Layer
– Translation, Encryption and Compression of Data
●Session Layer
– Session Management, Authentication, Authorisation
●Transport Layer
– Segmentation, Flow control, Error control
– TCP and UDP
31. 31
●Network Layer
– Logical Addressing, routing
– Path determination
– Converts segments into packets
●Data Link Layer
– Physical addressing
– Collision prevention
– Converts packets to frames
●Physical Layer
– Responsible for transmission of raw bits over a
communication channel
– Converts data bits into signals
– Communication channel can be air(radio signals), optical
fibre, coaxial cable etc.
32. 32
●TCP/IP Reference Model
– Developed During 1960s by United States
department of defence(DoD)
– TCP-Transmission Control Protocol
– IP-Internet Protocol
– This model has 4 layers
● Application Layer
● Transport Layer
● Internet Layer
● Host to Network Layer/Link Layer
34. 34
●Application Layer
– Includes protocols used by most applications.
– HTTP, FTP, SMTP etc
●Transport Layer
– Establishes end to end connectivity
– Protocols in this layer provides error control,
segmentation, flow control etc.
– Message transmission is done either by UDP or
TCP.
35. 35
●Internet Layer
– This layer exchanges data packets across the
network.
– Primary protocol in this layer is the Internet
Protocol
– Functions of this layer includes packet delivery,
routing and congestion avoidance.
●Link layer/Host to network layer
– Defines how data is physically sent through the
network.
– Bits are converted to signals.
37. 37
Modes of Data Transmission
#Transmission mode defines the direction of
flow of signals between two connected devices.
There are three modes of transmission
●Simplex
●Half Duplex
●Full Duplex
38. 38
●Simplex
– In simplex transmission mode, the communication
between sender and receiver occurs only in one
direction. The sender can only send the data and the
receiver can only receive the data. The receiver
cannot reply to the sender.
– Simplex is like a one way road.
– Eg:CPU-monitor communication
●Half Duplex
– The communication between sender and receiver
occurs in both the directions in a half duplex
transmission but, one at a time. The sender and
receiver both can send and receive the information but,
only one is allowed to send at a time.
– Eg: walkie-talkie
39. • Full Duplex
• In full duplex transmission
mode, the communication
between sender and
receiver can occur
simultaneously. The sender
and receiver can both
transmit and receive at the
same time.
• Eg: telephone
39