SlideShare a Scribd company logo
Network Wordsearch
Characteristics of a network
Topology
Protocol
Architecture
Network Protocols
Ethernet
• Most widely used for LAN networks, in
particular S___ and b__ topologies.
•
The computer checks if the network cable is
clear and has no d___ and then will send data.
Network Protocols
Ethernet
• Most widely used for LAN networks, in
particular star and bus topologies.
•
The computer checks if the network cable is
clear and has no data and then will send data.
Network Protocols
IBM token-ring
This protocol works in the form of a
ring and is made up of a
controlling computer and other
computers.
Network Protocols
IBM token-ring
The _______ computer sends a
token in the ring which travels
from one computer to another.
When a computer wants to send a
message, it waits for an empty
token.
Network Protocols
IBM token-ring
-The controlling computer sends a
token in the ring which travels
from one computer to another.
-When a computer wants to send a
message, it waits for an empty
token.
Network Protocols
IBM token-ring
-The controlling computer sends a
token in the ring which travels
from one computer to another.
-When a computer wants to send a
message, it waits for an empty
token.
Network Protocols
IBM token-ring
-When a computer finds an E_____
token, it fills it with the address of
the destination station along with a
message.
-The token then goes around the
ring until it reaches the
C________ that the message
came from.
Network Protocols
IBM token-ring
When a computer finds an empty
token, it fills it with the address of
the destination station along with a
message.
The token then goes around the
ring until it reaches the Computer
that the message came from.
Network Architecture

Peer to Peer Architecture
-tasks are distributed evenly amongst peers, no
central infrastruture.
-computers connect with each other in a
workgroup to share files, printers and internet.

Client/Server Architecture
-tasks are distributed between the server and
clients. The server provides the resource for
clients on request. This is commonly used by
companies.

More Related Content

What's hot

Topic 2.2 network protocol
Topic 2.2 network protocolTopic 2.2 network protocol
Topic 2.2 network protocol
Atika Zaimi
 
Introduction to CCNA
Introduction to CCNAIntroduction to CCNA
Introduction to CCNA
Anis Mizi
 
Topic 2.1 network communication using osi model part1
Topic 2.1 network communication using osi   model part1Topic 2.1 network communication using osi   model part1
Topic 2.1 network communication using osi model part1
Atika Zaimi
 
SET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEMSET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEM
EILLEN IVY PORTUGUEZ
 
2.2.1.4 internet address amrizah
2.2.1.4 internet address amrizah2.2.1.4 internet address amrizah
2.2.1.4 internet address amrizahhazirma
 
Computer Ports
Computer PortsComputer Ports
Computer Ports
Netwax Lab
 
Osi model
Osi modelOsi model
Osi model
NowrinJahanSiam
 
Project report
Project reportProject report
Project report
NowrinJahanSiam
 
Devices copy
Devices   copyDevices   copy
Devices copyhumnirox
 
Addressing in Computer Networks
Addressing in Computer NetworksAddressing in Computer Networks
Addressing in Computer Networks
Janki Shah
 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless Technology
Netwax Lab
 
Tracing An IP Address or Domain Name by Raghu Khimani
Tracing An IP Address or Domain Name by Raghu KhimaniTracing An IP Address or Domain Name by Raghu Khimani
Tracing An IP Address or Domain Name by Raghu Khimani
Dr Raghu Khimani
 
Communication using network
Communication using networkCommunication using network
Communication using network
Online
 
IP and MAC Address
IP and MAC AddressIP and MAC Address
What is a static ip address
What is a static ip addressWhat is a static ip address
What is a static ip address
Hexa Howe
 
C n practical file
C n practical fileC n practical file
C n practical file
Soumya Behera
 
Week 6 osi-tcp
Week 6    osi-tcpWeek 6    osi-tcp
Week 6 osi-tcp
Steve Roebuck
 

What's hot (19)

Topic 2.2 network protocol
Topic 2.2 network protocolTopic 2.2 network protocol
Topic 2.2 network protocol
 
Routers and planes
Routers and planesRouters and planes
Routers and planes
 
Introduction to CCNA
Introduction to CCNAIntroduction to CCNA
Introduction to CCNA
 
Topic 2.1 network communication using osi model part1
Topic 2.1 network communication using osi   model part1Topic 2.1 network communication using osi   model part1
Topic 2.1 network communication using osi model part1
 
SET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEMSET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEM
 
2.2.1.4 internet address amrizah
2.2.1.4 internet address amrizah2.2.1.4 internet address amrizah
2.2.1.4 internet address amrizah
 
Computer Ports
Computer PortsComputer Ports
Computer Ports
 
Osi model
Osi modelOsi model
Osi model
 
Project report
Project reportProject report
Project report
 
Devices copy
Devices   copyDevices   copy
Devices copy
 
Addressing in Computer Networks
Addressing in Computer NetworksAddressing in Computer Networks
Addressing in Computer Networks
 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless Technology
 
Unit04
Unit04Unit04
Unit04
 
Tracing An IP Address or Domain Name by Raghu Khimani
Tracing An IP Address or Domain Name by Raghu KhimaniTracing An IP Address or Domain Name by Raghu Khimani
Tracing An IP Address or Domain Name by Raghu Khimani
 
Communication using network
Communication using networkCommunication using network
Communication using network
 
IP and MAC Address
IP and MAC AddressIP and MAC Address
IP and MAC Address
 
What is a static ip address
What is a static ip addressWhat is a static ip address
What is a static ip address
 
C n practical file
C n practical fileC n practical file
C n practical file
 
Week 6 osi-tcp
Week 6    osi-tcpWeek 6    osi-tcp
Week 6 osi-tcp
 

Viewers also liked

Sarita Witesd
Sarita WitesdSarita Witesd
Sarita Witesd
Sarita Witesd
 
Computer Graphics
Computer GraphicsComputer Graphics
Computer Graphics
Govinda Aryal
 
Creativity investigation
Creativity investigationCreativity investigation
Creativity investigationleahfisher12
 
1603 visit to switzerland haefeli rus
1603 visit to switzerland haefeli rus1603 visit to switzerland haefeli rus
1603 visit to switzerland haefeli rus
Ecolife Journal
 
Walnuts for Heart Health
 Walnuts for Heart Health   Walnuts for Heart Health
Walnuts for Heart Health
Just for Hearts
 
программа круглого стола в совете федерации
программа круглого стола в совете федерациипрограмма круглого стола в совете федерации
программа круглого стола в совете федерации
Ecolife Journal
 
Efficiency of explosive rock fragmentation
Efficiency of explosive rock fragmentationEfficiency of explosive rock fragmentation
Efficiency of explosive rock fragmentationNenad Djordjevic
 
ESP The role of the esp teacher : orientation
ESP The role of the esp teacher : orientationESP The role of the esp teacher : orientation
ESP The role of the esp teacher : orientation
Solihatin Iji
 
The role of the esp teacher
The role of the esp teacherThe role of the esp teacher
The role of the esp teacher
yakee73
 

Viewers also liked (12)

Sarita Witesd
Sarita WitesdSarita Witesd
Sarita Witesd
 
Denise van Rooyen
Denise van RooyenDenise van Rooyen
Denise van Rooyen
 
Computer Graphics
Computer GraphicsComputer Graphics
Computer Graphics
 
RESUME 2015
RESUME 2015RESUME 2015
RESUME 2015
 
Creativity investigation
Creativity investigationCreativity investigation
Creativity investigation
 
Compiled Thesis
Compiled ThesisCompiled Thesis
Compiled Thesis
 
1603 visit to switzerland haefeli rus
1603 visit to switzerland haefeli rus1603 visit to switzerland haefeli rus
1603 visit to switzerland haefeli rus
 
Walnuts for Heart Health
 Walnuts for Heart Health   Walnuts for Heart Health
Walnuts for Heart Health
 
программа круглого стола в совете федерации
программа круглого стола в совете федерациипрограмма круглого стола в совете федерации
программа круглого стола в совете федерации
 
Efficiency of explosive rock fragmentation
Efficiency of explosive rock fragmentationEfficiency of explosive rock fragmentation
Efficiency of explosive rock fragmentation
 
ESP The role of the esp teacher : orientation
ESP The role of the esp teacher : orientationESP The role of the esp teacher : orientation
ESP The role of the esp teacher : orientation
 
The role of the esp teacher
The role of the esp teacherThe role of the esp teacher
The role of the esp teacher
 

Similar to Lesson 4 maya 4

A Deep Dive in the World of IT Networking (part 1)
A Deep Dive in the World of IT Networking (part 1)A Deep Dive in the World of IT Networking (part 1)
A Deep Dive in the World of IT Networking (part 1)
Tuan Yang
 
Networkprotocolstructurescope 130719081246-phpapp01
Networkprotocolstructurescope 130719081246-phpapp01Networkprotocolstructurescope 130719081246-phpapp01
Networkprotocolstructurescope 130719081246-phpapp01Gaurav Goyal
 
Network protocol structure scope
Network protocol structure scopeNetwork protocol structure scope
Network protocol structure scope
Sanat Maharjan
 
Unit-1 Introduction to WWW and Network.pptx
Unit-1 Introduction to WWW and Network.pptxUnit-1 Introduction to WWW and Network.pptx
Unit-1 Introduction to WWW and Network.pptx
sahilraturi
 
Addressing in networking (IP,MAC,Port addressing)
Addressing in networking (IP,MAC,Port addressing)Addressing in networking (IP,MAC,Port addressing)
Addressing in networking (IP,MAC,Port addressing)
Geethu Jose
 
Basic networking
Basic networkingBasic networking
Basic networking
ajeeshr3
 
Chapter15.pptx
Chapter15.pptxChapter15.pptx
Chapter15.pptx
bunyodbekEshmminov
 
what is Networking and types of computer .pptx
what is Networking and types of computer .pptxwhat is Networking and types of computer .pptx
what is Networking and types of computer .pptx
tthind
 
Modue 1 part 1 of computer networks for your university exams
Modue 1 part 1 of computer networks for your university examsModue 1 part 1 of computer networks for your university exams
Modue 1 part 1 of computer networks for your university exams
vish21ainds
 
How the internet works
How the internet worksHow the internet works
How the internet worksftcim
 
Computer Network
Computer NetworkComputer Network
Power point presentation
Power point presentationPower point presentation
Power point presentation
rajasekarsankar
 
KRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptxKRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptx
ADITYAKUMAR554673
 
Networking Basic Refresh.pdf
Networking Basic Refresh.pdfNetworking Basic Refresh.pdf
Networking Basic Refresh.pdf
CS Knowledge
 
History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internet
Tallat Satti
 
chapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhjchapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhj
AmitDeshai
 
Ethernet and Token ring (Computer Networks)
Ethernet and Token ring (Computer Networks)Ethernet and Token ring (Computer Networks)
Ethernet and Token ring (Computer Networks)
Shail Nakum
 
ppt on servicenow.pptx
ppt on servicenow.pptxppt on servicenow.pptx
ppt on servicenow.pptx
SimarpreetKaur735622
 
09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx
KushalSrivastava23
 
Automation and Robotics 20ME51I_Week_3_Practicals.pdf
Automation and Robotics 20ME51I_Week_3_Practicals.pdfAutomation and Robotics 20ME51I_Week_3_Practicals.pdf
Automation and Robotics 20ME51I_Week_3_Practicals.pdf
Gandhibabu8
 

Similar to Lesson 4 maya 4 (20)

A Deep Dive in the World of IT Networking (part 1)
A Deep Dive in the World of IT Networking (part 1)A Deep Dive in the World of IT Networking (part 1)
A Deep Dive in the World of IT Networking (part 1)
 
Networkprotocolstructurescope 130719081246-phpapp01
Networkprotocolstructurescope 130719081246-phpapp01Networkprotocolstructurescope 130719081246-phpapp01
Networkprotocolstructurescope 130719081246-phpapp01
 
Network protocol structure scope
Network protocol structure scopeNetwork protocol structure scope
Network protocol structure scope
 
Unit-1 Introduction to WWW and Network.pptx
Unit-1 Introduction to WWW and Network.pptxUnit-1 Introduction to WWW and Network.pptx
Unit-1 Introduction to WWW and Network.pptx
 
Addressing in networking (IP,MAC,Port addressing)
Addressing in networking (IP,MAC,Port addressing)Addressing in networking (IP,MAC,Port addressing)
Addressing in networking (IP,MAC,Port addressing)
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Chapter15.pptx
Chapter15.pptxChapter15.pptx
Chapter15.pptx
 
what is Networking and types of computer .pptx
what is Networking and types of computer .pptxwhat is Networking and types of computer .pptx
what is Networking and types of computer .pptx
 
Modue 1 part 1 of computer networks for your university exams
Modue 1 part 1 of computer networks for your university examsModue 1 part 1 of computer networks for your university exams
Modue 1 part 1 of computer networks for your university exams
 
How the internet works
How the internet worksHow the internet works
How the internet works
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Power point presentation
Power point presentationPower point presentation
Power point presentation
 
KRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptxKRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptx
 
Networking Basic Refresh.pdf
Networking Basic Refresh.pdfNetworking Basic Refresh.pdf
Networking Basic Refresh.pdf
 
History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internet
 
chapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhjchapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhj
 
Ethernet and Token ring (Computer Networks)
Ethernet and Token ring (Computer Networks)Ethernet and Token ring (Computer Networks)
Ethernet and Token ring (Computer Networks)
 
ppt on servicenow.pptx
ppt on servicenow.pptxppt on servicenow.pptx
ppt on servicenow.pptx
 
09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx
 
Automation and Robotics 20ME51I_Week_3_Practicals.pdf
Automation and Robotics 20ME51I_Week_3_Practicals.pdfAutomation and Robotics 20ME51I_Week_3_Practicals.pdf
Automation and Robotics 20ME51I_Week_3_Practicals.pdf
 

More from Max Friel

Assum 4
Assum 4Assum 4
Assum 4
Max Friel
 
Assum 3
Assum 3Assum 3
Assum 3
Max Friel
 
Tourism
TourismTourism
Tourism
Max Friel
 
Practice programs
Practice programsPractice programs
Practice programs
Max Friel
 
Project 1
Project 1Project 1
Project 1
Max Friel
 
Practice and debugging
Practice and debuggingPractice and debugging
Practice and debugging
Max Friel
 
Debugging
DebuggingDebugging
Debugging
Max Friel
 
Strings
StringsStrings
Strings
Max Friel
 
Loops
LoopsLoops
Loops
Max Friel
 
Loops
LoopsLoops
Loops
Max Friel
 
If conditions
If conditionsIf conditions
If conditions
Max Friel
 
Keywords used in javascript
Keywords used in javascriptKeywords used in javascript
Keywords used in javascriptMax Friel
 
Developing html skills 1
Developing html skills 1Developing html skills 1
Developing html skills 1Max Friel
 
Matching game
Matching gameMatching game
Matching gameMax Friel
 
activity flowcharts
activity flowchartsactivity flowcharts
activity flowchartsMax Friel
 
Summer course
Summer courseSummer course
Summer courseMax Friel
 

More from Max Friel (20)

Assum 4
Assum 4Assum 4
Assum 4
 
Assum 3
Assum 3Assum 3
Assum 3
 
Tourism
TourismTourism
Tourism
 
Practice programs
Practice programsPractice programs
Practice programs
 
Project 1
Project 1Project 1
Project 1
 
Practice and debugging
Practice and debuggingPractice and debugging
Practice and debugging
 
Debugging
DebuggingDebugging
Debugging
 
Strings
StringsStrings
Strings
 
Loops
LoopsLoops
Loops
 
Loops
LoopsLoops
Loops
 
If conditions
If conditionsIf conditions
If conditions
 
Keywords used in javascript
Keywords used in javascriptKeywords used in javascript
Keywords used in javascript
 
Variables
VariablesVariables
Variables
 
Basics
BasicsBasics
Basics
 
Developing html skills 1
Developing html skills 1Developing html skills 1
Developing html skills 1
 
Matching game
Matching gameMatching game
Matching game
 
activity flowcharts
activity flowchartsactivity flowcharts
activity flowcharts
 
Lesson one
Lesson oneLesson one
Lesson one
 
Summer course
Summer courseSummer course
Summer course
 
Law
LawLaw
Law
 

Recently uploaded

A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 

Recently uploaded (20)

A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 

Lesson 4 maya 4

  • 2. Characteristics of a network Topology Protocol Architecture
  • 3. Network Protocols Ethernet • Most widely used for LAN networks, in particular S___ and b__ topologies. • The computer checks if the network cable is clear and has no d___ and then will send data.
  • 4. Network Protocols Ethernet • Most widely used for LAN networks, in particular star and bus topologies. • The computer checks if the network cable is clear and has no data and then will send data.
  • 5. Network Protocols IBM token-ring This protocol works in the form of a ring and is made up of a controlling computer and other computers.
  • 6. Network Protocols IBM token-ring The _______ computer sends a token in the ring which travels from one computer to another. When a computer wants to send a message, it waits for an empty token.
  • 7. Network Protocols IBM token-ring -The controlling computer sends a token in the ring which travels from one computer to another. -When a computer wants to send a message, it waits for an empty token.
  • 8. Network Protocols IBM token-ring -The controlling computer sends a token in the ring which travels from one computer to another. -When a computer wants to send a message, it waits for an empty token.
  • 9. Network Protocols IBM token-ring -When a computer finds an E_____ token, it fills it with the address of the destination station along with a message. -The token then goes around the ring until it reaches the C________ that the message came from.
  • 10. Network Protocols IBM token-ring When a computer finds an empty token, it fills it with the address of the destination station along with a message. The token then goes around the ring until it reaches the Computer that the message came from.
  • 11. Network Architecture  Peer to Peer Architecture -tasks are distributed evenly amongst peers, no central infrastruture. -computers connect with each other in a workgroup to share files, printers and internet.  Client/Server Architecture -tasks are distributed between the server and clients. The server provides the resource for clients on request. This is commonly used by companies.