SlideShare a Scribd company logo
WELCOME
 OBJECTIVE
Students will be able to describe the purpose
and functions of network components.
Describe the purpose and functions
of network components.Types, functions, configuration, topologies and purpose
of networks including:
1. Local Area Network (LAN)
2. Wide Area Network (WAN)
3. Metropolitan Area Network (MAN)
4. Virtual Private Network (VPN)
1. Internet
2. Extranet
3. Intranet
4. Virtual Router software
Transmission Media
 Wired versus Wireless
 Fibre Optic
 Unshielded Twisted Pair (UTP)
 Hotspots
 Protocols
Definitions and Examples
 Network Security
 Firewalls

More Related Content

What's hot

Protocol manet
Protocol manetProtocol manet
Protocol manet
Kunal Prajapati
 
A044060107
A044060107A044060107
A044060107
IJERA Editor
 
Ensuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic NetworkEnsuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic Network
IOSR Journals
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
Sunita Sahu
 
Combuter term3 new
Combuter term3 newCombuter term3 new
Combuter term3 new
Pospos Pasiposo
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
ijwmn
 
Hg3312711275
Hg3312711275Hg3312711275
Hg3312711275
IJERA Editor
 
Analysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkAnalysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor network
ijwmn
 
D43021519
D43021519D43021519
D43021519
IJERA Editor
 
Abdullah Mukhtar ppt
Abdullah Mukhtar pptAbdullah Mukhtar ppt
Abdullah Mukhtar ppt
Abdullah Mukhtar
 
Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsWormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systems
Pvrtechnologies Nellore
 
Computer network
Computer network Computer network
Computer network
Gyan Jyoti Gogoi
 
Internet
InternetInternet
Internet
cktanums
 
Assignment1
Assignment1Assignment1
Assignment1
NishatTasnimAli
 
Wmcn outline summer2011
Wmcn outline summer2011Wmcn outline summer2011
Wmcn outline summer2011Alaa2
 
Computer Network Theory Part 2
Computer Network Theory Part 2Computer Network Theory Part 2
Computer Network Theory Part 2
NishatTasnimAli
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
IRJET Journal
 

What's hot (19)

Protocol manet
Protocol manetProtocol manet
Protocol manet
 
A044060107
A044060107A044060107
A044060107
 
Ensuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic NetworkEnsuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic Network
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
 
Combuter term3 new
Combuter term3 newCombuter term3 new
Combuter term3 new
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
 
Wireless ad hoc
Wireless ad hocWireless ad hoc
Wireless ad hoc
 
Hg3312711275
Hg3312711275Hg3312711275
Hg3312711275
 
Analysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkAnalysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor network
 
D43021519
D43021519D43021519
D43021519
 
Abdullah Mukhtar ppt
Abdullah Mukhtar pptAbdullah Mukhtar ppt
Abdullah Mukhtar ppt
 
Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsWormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systems
 
Computer network
Computer network Computer network
Computer network
 
Internet
InternetInternet
Internet
 
Assignment1
Assignment1Assignment1
Assignment1
 
1705 1708
1705 17081705 1708
1705 1708
 
Wmcn outline summer2011
Wmcn outline summer2011Wmcn outline summer2011
Wmcn outline summer2011
 
Computer Network Theory Part 2
Computer Network Theory Part 2Computer Network Theory Part 2
Computer Network Theory Part 2
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
 

Viewers also liked

"Dejar de ser la amante y pasar a ser la esposa"
"Dejar de ser la amante y pasar a ser la esposa""Dejar de ser la amante y pasar a ser la esposa"
"Dejar de ser la amante y pasar a ser la esposa"
Comisión Colombiana de Juristas
 
Sin garantía del derecho a la reparación
Sin garantía del derecho a la reparaciónSin garantía del derecho a la reparación
Sin garantía del derecho a la reparación
Comisión Colombiana de Juristas
 
Koetstock Magazine 2012
Koetstock Magazine 2012Koetstock Magazine 2012
Koetstock Magazine 2012
Interlitho
 
Trivago: Review Firmata e Certificata
Trivago: Review Firmata e CertificataTrivago: Review Firmata e Certificata
Trivago: Review Firmata e CertificataFormazioneTurismo
 
Hay que poner los pies sobre la tierra
Hay que poner los pies sobre la tierraHay que poner los pies sobre la tierra
Hay que poner los pies sobre la tierra
Comisión Colombiana de Juristas
 
2013 mayo perlas
2013 mayo perlas2013 mayo perlas
2013 mayo perlas
Juan Aldave
 
Frischkorn AV2
Frischkorn AV2Frischkorn AV2
Frischkorn AV2shanita88
 
Neoparamilitarism and new massacres
Neoparamilitarism and new massacresNeoparamilitarism and new massacres
Neoparamilitarism and new massacres
Comisión Colombiana de Juristas
 
Biologics World Taiwan 2016 (email me at justin.dejesus@imapac.com)
Biologics World Taiwan 2016 (email me at justin.dejesus@imapac.com) Biologics World Taiwan 2016 (email me at justin.dejesus@imapac.com)
Biologics World Taiwan 2016 (email me at justin.dejesus@imapac.com)
Justin Barin de Jesus
 
1 transtono (disorder) não é um conceito científico nem a cid é uma classif...
1   transtono (disorder) não é um conceito científico nem a cid é uma classif...1   transtono (disorder) não é um conceito científico nem a cid é uma classif...
1 transtono (disorder) não é um conceito científico nem a cid é uma classif...Luiz Miranda-Sá
 
cleangeo - Cleaning Geometries from Spatial Objects in R
cleangeo - Cleaning Geometries from Spatial Objects in Rcleangeo - Cleaning Geometries from Spatial Objects in R
cleangeo - Cleaning Geometries from Spatial Objects in R
Emmanuel Blondel
 
Koetstock Magazine 2013
Koetstock Magazine 2013Koetstock Magazine 2013
Koetstock Magazine 2013
Interlitho
 
Unternehmenspräsentation Westfalen Gruppe 2014
Unternehmenspräsentation Westfalen Gruppe 2014Unternehmenspräsentation Westfalen Gruppe 2014
Unternehmenspräsentation Westfalen Gruppe 2014
Westfalen_Gruppe
 
The Power of EPiServer 7: Multiscreen Content Management
The Power of EPiServer 7: Multiscreen Content ManagementThe Power of EPiServer 7: Multiscreen Content Management
The Power of EPiServer 7: Multiscreen Content Management
robinepiserver
 
Revista de seguros fenaseg
Revista de seguros fenasegRevista de seguros fenaseg
Revista de seguros fenaseg
Universidade Federal Fluminense
 
1 4 pl gıda lojistiği sunumu
1  4 pl gıda lojistiği sunumu1  4 pl gıda lojistiği sunumu
1 4 pl gıda lojistiği sunumuİsmail Karayün
 
Kamgna, Optimum Des Reserves De Changes De La Cemac
Kamgna, Optimum Des Reserves De Changes De La CemacKamgna, Optimum Des Reserves De Changes De La Cemac
Kamgna, Optimum Des Reserves De Changes De La Cemac
BEAC
 
Apostila de louvor e adoracao
Apostila de louvor e adoracaoApostila de louvor e adoracao
Apostila de louvor e adoracaoRosemary S. Duque
 

Viewers also liked (20)

"Dejar de ser la amante y pasar a ser la esposa"
"Dejar de ser la amante y pasar a ser la esposa""Dejar de ser la amante y pasar a ser la esposa"
"Dejar de ser la amante y pasar a ser la esposa"
 
Sin garantía del derecho a la reparación
Sin garantía del derecho a la reparaciónSin garantía del derecho a la reparación
Sin garantía del derecho a la reparación
 
Koetstock Magazine 2012
Koetstock Magazine 2012Koetstock Magazine 2012
Koetstock Magazine 2012
 
Trivago: Review Firmata e Certificata
Trivago: Review Firmata e CertificataTrivago: Review Firmata e Certificata
Trivago: Review Firmata e Certificata
 
Hay que poner los pies sobre la tierra
Hay que poner los pies sobre la tierraHay que poner los pies sobre la tierra
Hay que poner los pies sobre la tierra
 
2013 mayo perlas
2013 mayo perlas2013 mayo perlas
2013 mayo perlas
 
Frischkorn AV2
Frischkorn AV2Frischkorn AV2
Frischkorn AV2
 
Aeiou
AeiouAeiou
Aeiou
 
Neoparamilitarism and new massacres
Neoparamilitarism and new massacresNeoparamilitarism and new massacres
Neoparamilitarism and new massacres
 
Biologics World Taiwan 2016 (email me at justin.dejesus@imapac.com)
Biologics World Taiwan 2016 (email me at justin.dejesus@imapac.com) Biologics World Taiwan 2016 (email me at justin.dejesus@imapac.com)
Biologics World Taiwan 2016 (email me at justin.dejesus@imapac.com)
 
1 transtono (disorder) não é um conceito científico nem a cid é uma classif...
1   transtono (disorder) não é um conceito científico nem a cid é uma classif...1   transtono (disorder) não é um conceito científico nem a cid é uma classif...
1 transtono (disorder) não é um conceito científico nem a cid é uma classif...
 
cleangeo - Cleaning Geometries from Spatial Objects in R
cleangeo - Cleaning Geometries from Spatial Objects in Rcleangeo - Cleaning Geometries from Spatial Objects in R
cleangeo - Cleaning Geometries from Spatial Objects in R
 
Koetstock Magazine 2013
Koetstock Magazine 2013Koetstock Magazine 2013
Koetstock Magazine 2013
 
Unternehmenspräsentation Westfalen Gruppe 2014
Unternehmenspräsentation Westfalen Gruppe 2014Unternehmenspräsentation Westfalen Gruppe 2014
Unternehmenspräsentation Westfalen Gruppe 2014
 
The Power of EPiServer 7: Multiscreen Content Management
The Power of EPiServer 7: Multiscreen Content ManagementThe Power of EPiServer 7: Multiscreen Content Management
The Power of EPiServer 7: Multiscreen Content Management
 
Revista de seguros fenaseg
Revista de seguros fenasegRevista de seguros fenaseg
Revista de seguros fenaseg
 
1 4 pl gıda lojistiği sunumu
1  4 pl gıda lojistiği sunumu1  4 pl gıda lojistiği sunumu
1 4 pl gıda lojistiği sunumu
 
Kamgna, Optimum Des Reserves De Changes De La Cemac
Kamgna, Optimum Des Reserves De Changes De La CemacKamgna, Optimum Des Reserves De Changes De La Cemac
Kamgna, Optimum Des Reserves De Changes De La Cemac
 
LI-FI TECHNOLOGY
LI-FI TECHNOLOGYLI-FI TECHNOLOGY
LI-FI TECHNOLOGY
 
Apostila de louvor e adoracao
Apostila de louvor e adoracaoApostila de louvor e adoracao
Apostila de louvor e adoracao
 

Recently uploaded

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 

Recently uploaded (20)

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 

Lesson 10 assignment

  • 1. WELCOME  OBJECTIVE Students will be able to describe the purpose and functions of network components.
  • 2. Describe the purpose and functions of network components.Types, functions, configuration, topologies and purpose of networks including: 1. Local Area Network (LAN) 2. Wide Area Network (WAN) 3. Metropolitan Area Network (MAN) 4. Virtual Private Network (VPN) 1. Internet 2. Extranet 3. Intranet 4. Virtual Router software
  • 3. Transmission Media  Wired versus Wireless  Fibre Optic  Unshielded Twisted Pair (UTP)  Hotspots  Protocols
  • 4. Definitions and Examples  Network Security  Firewalls