SlideShare a Scribd company logo
INTRODUCTION TO COMPUTER
NETWORKS
What is a Computer Network?
A system containing any combination of computers, computer terminals,
printers, audio or visual display devices, or telephones interconnected by
telecommunication equipment or cables: used to transmit or receive information.
The Network Diagram
Types of Network
There are many types of computer networking which are used world
wide these days. There are some types of network that are using
Worldwide:
 LAN - Local Area Network
 WAN - Wide Area Network
 WLAN - Wireless Local Area Network
 PAN - Personal Area Network
 SAN - Storage Area Network
 GAN - Global Area Network
 MAN - Metropolitan Area Network
 CAN - Controller Area Network
 DAN - Desk Area Network
 VPN - Virtual Private Network
Distinguish Between LAN,WAN,MAN
Network Classification By Their Component Role
Peer To Peer Network
 In peer to peer network each computer is responsible for making its own
resources available to other computers on the network.
 Each computer is responsible for setting up and maintaining its own
security for these resources.
 Also each computer is responsible for accessing the required network
resources from peer to peer relationships.
 Peer to peer network is useful for a small network containing less than 10
computers on a single LAN .
 In peer to peer network each computer can function as both client and
server.
 Peer to peer networks do not have a central control system. There are no
servers in peer networks.
 Peer networks are amplified into home group.
Advantages & Disadvantages of Peer To Peer Network
Advantages:
 Use less expensive
computer hardware
 Easy to administer
 No NOS required
 More built in
redundancy
 Easy setup & low cost
Disadvantages:
 Not very secure
 No central point of storage or file
archiving
 Additional load on computer
because of resource sharing
 Hard to maintain version control
Client/Server Network
 In client-server network relationships, certain computers act as
server and other act as clients. A server is simply a computer, that
available the network resources and provides service to other
computers when they request it. A client is the computer running a
program that requests the service from a server.
 Local area network(LAN) is based on client server network
relationship.
 A client-server network is one on which all available network
resources such as files, directories, applications and shared devices,
are centrally managed and hosted and then are accessed by client.
 Client serve network are defined by the presence of servers on a
network that provide security and administration of the network.
Advantages and Disadvantages of Client/Server Network
Advantages:
• Very secure
• Better performance
• Centralized backup
• very reliable
Disadvantages:
• Requires professional administration
• More hardware intensive
• More software intensive
• Expensive dedicated software
Types of Servers
 File server: These servers provide the services for storing, retrieving
and moving the data. A user can read, write, exchange and manage
the files with the help of file servers.
 Printer server: The printer server is used for controlling and
managing printing on the network. It also offers the fax service to
the network users.
 Application server: The expensive software and additional
computing power can be shared by the computers in a network with
he help of application servers.
 Message server: It is used to co-ordinate the interaction between
users, documents and applications. The data can be used in the for
of audio, video, binary, text or graphics.
 Database server: It is a type of application server
Applications of Computer Network :
 Sharing of resources such as printers
 Sharing of expensive software's and database
 Communication from one computer to another computer
 Exchange of data and information among users via network
 Sharing of information over geographically wide areas.
Components of Computer Network
Two or more computers
Cables as links between the computers
A network interfacing card(NIC) on each computer
Switches
Software called operating system(OS)
Network Benefits
The network provided to the users can be divided into two categories:
 Sharing
 Connectivity
Sharing Resources
Types of resources are:
 Hardware: A network allows users to share many hardware devices
such as printers , modems, fax machines, CD ROM, players, etc.
 Software: sharing software resources reduces the cost of software
installation, saves space on hard disk.
Other Benefits of Computer Network
 Increased speed
 Reduced cost
 Improved security
 Centralized software managements
 Electronic mail
 Flexible access
Disadvantages of Computer Networks
High cost of installation
Requires time for administration
Failure of server
Cable faults
INTRODUCTION_TO_COMPUTER_NETWORKS.pptx
INTRODUCTION_TO_COMPUTER_NETWORKS.pptx
INTRODUCTION_TO_COMPUTER_NETWORKS.pptx
INTRODUCTION_TO_COMPUTER_NETWORKS.pptx
INTRODUCTION_TO_COMPUTER_NETWORKS.pptx
INTRODUCTION_TO_COMPUTER_NETWORKS.pptx
INTRODUCTION_TO_COMPUTER_NETWORKS.pptx
INTRODUCTION_TO_COMPUTER_NETWORKS.pptx
INTRODUCTION_TO_COMPUTER_NETWORKS.pptx
INTRODUCTION_TO_COMPUTER_NETWORKS.pptx
INTRODUCTION_TO_COMPUTER_NETWORKS.pptx
INTRODUCTION_TO_COMPUTER_NETWORKS.pptx
INTRODUCTION_TO_COMPUTER_NETWORKS.pptx
INTRODUCTION_TO_COMPUTER_NETWORKS.pptx
INTRODUCTION_TO_COMPUTER_NETWORKS.pptx

More Related Content

Similar to INTRODUCTION_TO_COMPUTER_NETWORKS.pptx

Computer networking
Computer networkingComputer networking
Computer networking
Tapan Khilar
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS Kak Yong
 
Chapter01 -- introduction to networking
Chapter01  -- introduction to networkingChapter01  -- introduction to networking
Chapter01 -- introduction to networking
Raja Waseem Akhtar
 
Introduction to computer networking
Introduction to computer networkingIntroduction to computer networking
Introduction to computer networking
Sameer Sharma
 
Overview of networks
Overview of networksOverview of networks
Overview of networks
Eman Al shaaban
 
Network administration Book
Network administration BookNetwork administration Book
Network administration Book
Muhammad Jawwad Hashmi
 
Rkp internet part i
Rkp internet part iRkp internet part i
Rkp internet part i
DR. Ram Kumar Pathak
 
Class work 2,computer_network_317
Class work 2,computer_network_317Class work 2,computer_network_317
Class work 2,computer_network_317
Khondoker Sadia
 
L1 - Computer Networks Review.pptx
L1 - Computer Networks Review.pptxL1 - Computer Networks Review.pptx
L1 - Computer Networks Review.pptx
MohamedFouardKanu
 
COMPUTER NETWORK
COMPUTER NETWORKCOMPUTER NETWORK
COMPUTER NETWORK
SindhuVelmukull
 
NAS
NASNAS
Types of Computer Networks
Types of Computer NetworksTypes of Computer Networks
Types of Computer Networks
Raja Adapa
 
Lecture-03 - Introduction To Network.pptx
Lecture-03 - Introduction To Network.pptxLecture-03 - Introduction To Network.pptx
Lecture-03 - Introduction To Network.pptx
Md. Sakhawat Hossain
 
Computer networks7
Computer networks7Computer networks7
Computer networks7
Ali Raza
 
Chapter 1 - Introduction to the basic concepts of networks.ppt
Chapter 1 - Introduction to the basic concepts of networks.pptChapter 1 - Introduction to the basic concepts of networks.ppt
Chapter 1 - Introduction to the basic concepts of networks.ppt
ssuser3acfba
 
Computer network introduction
Computer network introductionComputer network introduction
Computer network introduction
Sweta Kumari Barnwal
 
computer network basic concepets with diagram.pptx
computer network basic concepets with diagram.pptxcomputer network basic concepets with diagram.pptx
computer network basic concepets with diagram.pptx
PradiptaPaul7
 

Similar to INTRODUCTION_TO_COMPUTER_NETWORKS.pptx (20)

Computer networking
Computer networkingComputer networking
Computer networking
 
1 networking
1 networking1 networking
1 networking
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
 
Chapter01 -- introduction to networking
Chapter01  -- introduction to networkingChapter01  -- introduction to networking
Chapter01 -- introduction to networking
 
Introduction to computer networking
Introduction to computer networkingIntroduction to computer networking
Introduction to computer networking
 
Overview of networks
Overview of networksOverview of networks
Overview of networks
 
Network administration Book
Network administration BookNetwork administration Book
Network administration Book
 
Rkp internet part i
Rkp internet part iRkp internet part i
Rkp internet part i
 
Class work 2,computer_network_317
Class work 2,computer_network_317Class work 2,computer_network_317
Class work 2,computer_network_317
 
L1 - Computer Networks Review.pptx
L1 - Computer Networks Review.pptxL1 - Computer Networks Review.pptx
L1 - Computer Networks Review.pptx
 
COMPUTER NETWORK
COMPUTER NETWORKCOMPUTER NETWORK
COMPUTER NETWORK
 
NAS
NASNAS
NAS
 
Types of Computer Networks
Types of Computer NetworksTypes of Computer Networks
Types of Computer Networks
 
Lecture-03 - Introduction To Network.pptx
Lecture-03 - Introduction To Network.pptxLecture-03 - Introduction To Network.pptx
Lecture-03 - Introduction To Network.pptx
 
Computer networks7
Computer networks7Computer networks7
Computer networks7
 
Hardware1
Hardware1Hardware1
Hardware1
 
Hardware1
Hardware1Hardware1
Hardware1
 
Chapter 1 - Introduction to the basic concepts of networks.ppt
Chapter 1 - Introduction to the basic concepts of networks.pptChapter 1 - Introduction to the basic concepts of networks.ppt
Chapter 1 - Introduction to the basic concepts of networks.ppt
 
Computer network introduction
Computer network introductionComputer network introduction
Computer network introduction
 
computer network basic concepets with diagram.pptx
computer network basic concepets with diagram.pptxcomputer network basic concepets with diagram.pptx
computer network basic concepets with diagram.pptx
 

More from asaijohn

Java programming language for year 2.pptx
Java programming language for year 2.pptxJava programming language for year 2.pptx
Java programming language for year 2.pptx
asaijohn
 
Java well Summarize Tutorial for year 2.pptx
Java well Summarize Tutorial for year 2.pptxJava well Summarize Tutorial for year 2.pptx
Java well Summarize Tutorial for year 2.pptx
asaijohn
 
Discrete Mathematics introduction 1.pptx
Discrete Mathematics introduction 1.pptxDiscrete Mathematics introduction 1.pptx
Discrete Mathematics introduction 1.pptx
asaijohn
 
Network analysis and design unite_-i.ppt
Network analysis and design unite_-i.pptNetwork analysis and design unite_-i.ppt
Network analysis and design unite_-i.ppt
asaijohn
 
pcmaintenance_ppt_ch02_modified.ppt
pcmaintenance_ppt_ch02_modified.pptpcmaintenance_ppt_ch02_modified.ppt
pcmaintenance_ppt_ch02_modified.ppt
asaijohn
 
pcmaintenance_ppt_ch01_modified.ppt
pcmaintenance_ppt_ch01_modified.pptpcmaintenance_ppt_ch01_modified.ppt
pcmaintenance_ppt_ch01_modified.ppt
asaijohn
 
Computer_Fundamentals_Lectures_1_to_5 (1).ppt
Computer_Fundamentals_Lectures_1_to_5 (1).pptComputer_Fundamentals_Lectures_1_to_5 (1).ppt
Computer_Fundamentals_Lectures_1_to_5 (1).ppt
asaijohn
 

More from asaijohn (7)

Java programming language for year 2.pptx
Java programming language for year 2.pptxJava programming language for year 2.pptx
Java programming language for year 2.pptx
 
Java well Summarize Tutorial for year 2.pptx
Java well Summarize Tutorial for year 2.pptxJava well Summarize Tutorial for year 2.pptx
Java well Summarize Tutorial for year 2.pptx
 
Discrete Mathematics introduction 1.pptx
Discrete Mathematics introduction 1.pptxDiscrete Mathematics introduction 1.pptx
Discrete Mathematics introduction 1.pptx
 
Network analysis and design unite_-i.ppt
Network analysis and design unite_-i.pptNetwork analysis and design unite_-i.ppt
Network analysis and design unite_-i.ppt
 
pcmaintenance_ppt_ch02_modified.ppt
pcmaintenance_ppt_ch02_modified.pptpcmaintenance_ppt_ch02_modified.ppt
pcmaintenance_ppt_ch02_modified.ppt
 
pcmaintenance_ppt_ch01_modified.ppt
pcmaintenance_ppt_ch01_modified.pptpcmaintenance_ppt_ch01_modified.ppt
pcmaintenance_ppt_ch01_modified.ppt
 
Computer_Fundamentals_Lectures_1_to_5 (1).ppt
Computer_Fundamentals_Lectures_1_to_5 (1).pptComputer_Fundamentals_Lectures_1_to_5 (1).ppt
Computer_Fundamentals_Lectures_1_to_5 (1).ppt
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 

INTRODUCTION_TO_COMPUTER_NETWORKS.pptx

  • 2. What is a Computer Network? A system containing any combination of computers, computer terminals, printers, audio or visual display devices, or telephones interconnected by telecommunication equipment or cables: used to transmit or receive information. The Network Diagram
  • 3. Types of Network There are many types of computer networking which are used world wide these days. There are some types of network that are using Worldwide:  LAN - Local Area Network  WAN - Wide Area Network  WLAN - Wireless Local Area Network  PAN - Personal Area Network  SAN - Storage Area Network  GAN - Global Area Network  MAN - Metropolitan Area Network  CAN - Controller Area Network  DAN - Desk Area Network  VPN - Virtual Private Network
  • 4.
  • 6. Network Classification By Their Component Role
  • 7.
  • 8. Peer To Peer Network  In peer to peer network each computer is responsible for making its own resources available to other computers on the network.  Each computer is responsible for setting up and maintaining its own security for these resources.  Also each computer is responsible for accessing the required network resources from peer to peer relationships.  Peer to peer network is useful for a small network containing less than 10 computers on a single LAN .  In peer to peer network each computer can function as both client and server.  Peer to peer networks do not have a central control system. There are no servers in peer networks.  Peer networks are amplified into home group.
  • 9. Advantages & Disadvantages of Peer To Peer Network Advantages:  Use less expensive computer hardware  Easy to administer  No NOS required  More built in redundancy  Easy setup & low cost Disadvantages:  Not very secure  No central point of storage or file archiving  Additional load on computer because of resource sharing  Hard to maintain version control
  • 10. Client/Server Network  In client-server network relationships, certain computers act as server and other act as clients. A server is simply a computer, that available the network resources and provides service to other computers when they request it. A client is the computer running a program that requests the service from a server.  Local area network(LAN) is based on client server network relationship.  A client-server network is one on which all available network resources such as files, directories, applications and shared devices, are centrally managed and hosted and then are accessed by client.  Client serve network are defined by the presence of servers on a network that provide security and administration of the network.
  • 11. Advantages and Disadvantages of Client/Server Network Advantages: • Very secure • Better performance • Centralized backup • very reliable Disadvantages: • Requires professional administration • More hardware intensive • More software intensive • Expensive dedicated software
  • 13.  File server: These servers provide the services for storing, retrieving and moving the data. A user can read, write, exchange and manage the files with the help of file servers.  Printer server: The printer server is used for controlling and managing printing on the network. It also offers the fax service to the network users.  Application server: The expensive software and additional computing power can be shared by the computers in a network with he help of application servers.  Message server: It is used to co-ordinate the interaction between users, documents and applications. The data can be used in the for of audio, video, binary, text or graphics.  Database server: It is a type of application server
  • 14. Applications of Computer Network :  Sharing of resources such as printers  Sharing of expensive software's and database  Communication from one computer to another computer  Exchange of data and information among users via network  Sharing of information over geographically wide areas.
  • 15. Components of Computer Network Two or more computers Cables as links between the computers A network interfacing card(NIC) on each computer Switches Software called operating system(OS)
  • 16. Network Benefits The network provided to the users can be divided into two categories:  Sharing  Connectivity Sharing Resources Types of resources are:  Hardware: A network allows users to share many hardware devices such as printers , modems, fax machines, CD ROM, players, etc.  Software: sharing software resources reduces the cost of software installation, saves space on hard disk.
  • 17. Other Benefits of Computer Network  Increased speed  Reduced cost  Improved security  Centralized software managements  Electronic mail  Flexible access Disadvantages of Computer Networks High cost of installation Requires time for administration Failure of server Cable faults