SlideShare a Scribd company logo
1 of 10
Download to read offline
Welcome to Our
Presentation
London Atil
Data Communication &
Computer Network
Analysis, design, implementation, and usage of local, wide-area,
and mobile networks that connect computers are all included in
the discipline of networking and communication. The Internet is
a network that enables communication between almost all
computers around the globe.
Through a mix of infrared light signals, radio wave broadcasts, telephone
lines, television cables, and satellite links, a computer network connects
computers. The difficulty for computer scientists has been to create
protocols (standardized guidelines for the structure and exchange of
messages), which enable processes running on host computers to
interpret the signals they receive and to have meaningful "conversations"
to carry out tasks on behalf of users.
There is a worldwide movement to standardize procedures. The
main issue has been the need for system components (computers)
to be "open" since, in the absence of such, different types of
machines and operating systems would not be able to interact with
one another.
The physical layer, which contains the rules for the transmission of bits
through a physical link, is at the bottom of the protocol. The data-link layer
manages "packets" of data that are a defined size and improves
dependability through flow control and error detection bits. Messages are
divided into standard-size packets by the network and transport layers,
which then route them to their final locations.
Distributed systems, in which computers connected by a network share
data and processing responsibilities, were also produced by the
development of networks and communication protocols. For instance, a
distributed database system has a database that is dispersed over (or
duplicated across) many network nodes. At "mirror sites," data are
replicated, which can increase availability and dependability. A
distributed DBMS controls a database whose elements are dispersed
over several networked computers.
A client-server network is a distributed system in which users
connect to a single computer (the server) through the network from
their computers to access the database (the clients). Each client
independently and without knowledge of the presence of other
clients accessing the same database uses the server to supply data
and reply to requests from each client.
Peer-to-peer networks are another well-liked variety of distributed
systems. In contrast to client-server networks, peer-to-peer
networks operate under the premise that any connected computer
(or user) is capable of serving both clients and clients, making every
member of the network a peer.
Thank You For Your
Time

More Related Content

Similar to London Atil | Data Communication & Computer Network

934 Ch1 Networks
934 Ch1  Networks934 Ch1  Networks
934 Ch1 Networks
techbed
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
UMaine
 

Similar to London Atil | Data Communication & Computer Network (20)

Cn
CnCn
Cn
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
Cnetworks
CnetworksCnetworks
Cnetworks
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of network
 
Networking concepts by Sachidananda M H
Networking concepts by Sachidananda M HNetworking concepts by Sachidananda M H
Networking concepts by Sachidananda M H
 
934 Ch1 Networks
934 Ch1  Networks934 Ch1  Networks
934 Ch1 Networks
 
Afeche nettech
Afeche nettechAfeche nettech
Afeche nettech
 
Seminar report-networking
Seminar report-networkingSeminar report-networking
Seminar report-networking
 
10 New Web Application and Security.pptx
10 New Web Application and Security.pptx10 New Web Application and Security.pptx
10 New Web Application and Security.pptx
 
Fg c
Fg cFg c
Fg c
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
 
Introduction to computer networking
Introduction to computer networkingIntroduction to computer networking
Introduction to computer networking
 
E content network
E content networkE content network
E content network
 
Computers and more
Computers and moreComputers and more
Computers and more
 
BASIC_COMPUTER_NETWORKING (1).pdf
BASIC_COMPUTER_NETWORKING (1).pdfBASIC_COMPUTER_NETWORKING (1).pdf
BASIC_COMPUTER_NETWORKING (1).pdf
 
Computer network
Computer network Computer network
Computer network
 
Computer Network - Unit 1
Computer Network - Unit 1Computer Network - Unit 1
Computer Network - Unit 1
 
Data Communication & Network
Data Communication & NetworkData Communication & Network
Data Communication & Network
 
Computer network
Computer networkComputer network
Computer network
 

More from LondonAtil1

More from LondonAtil1 (11)

Strategies for Effective Cybersecurity in Web Development pdf.pdf
Strategies for Effective Cybersecurity in Web Development pdf.pdfStrategies for Effective Cybersecurity in Web Development pdf.pdf
Strategies for Effective Cybersecurity in Web Development pdf.pdf
 
How London Atil Integrates Web Dev and Digital Marketing
How London Atil Integrates Web Dev and Digital MarketingHow London Atil Integrates Web Dev and Digital Marketing
How London Atil Integrates Web Dev and Digital Marketing
 
Web Development and Digital Marketing in London Atil's Career
Web Development and Digital Marketing in London Atil's CareerWeb Development and Digital Marketing in London Atil's Career
Web Development and Digital Marketing in London Atil's Career
 
London Atil | The Guide to Thriving as a Full Stack Software Engineer
 London Atil | The Guide to Thriving as a Full Stack Software Engineer London Atil | The Guide to Thriving as a Full Stack Software Engineer
London Atil | The Guide to Thriving as a Full Stack Software Engineer
 
Effective Cybersecurity Strategies for Web Developers
Effective Cybersecurity Strategies for Web DevelopersEffective Cybersecurity Strategies for Web Developers
Effective Cybersecurity Strategies for Web Developers
 
London Atil| Choosing Between Software Development and Testing
London Atil| Choosing Between Software Development and TestingLondon Atil| Choosing Between Software Development and Testing
London Atil| Choosing Between Software Development and Testing
 
The Five Best Software Engineering Jobs That London Atil Recommends
 The Five Best Software Engineering Jobs That London Atil Recommends  The Five Best Software Engineering Jobs That London Atil Recommends
The Five Best Software Engineering Jobs That London Atil Recommends
 
London Etil has worked on a number of projects such as the Ruban Restore, KVM...
London Etil has worked on a number of projects such as the Ruban Restore, KVM...London Etil has worked on a number of projects such as the Ruban Restore, KVM...
London Etil has worked on a number of projects such as the Ruban Restore, KVM...
 
London Atil | Impact of Artificial Intelligence on Business
London Atil | Impact of Artificial Intelligence on BusinessLondon Atil | Impact of Artificial Intelligence on Business
London Atil | Impact of Artificial Intelligence on Business
 
London Atil | Do Employers Need Java Developers?
London Atil | Do Employers Need Java Developers?London Atil | Do Employers Need Java Developers?
London Atil | Do Employers Need Java Developers?
 
London Atil | Importance of Software Engineering In Software Development
London Atil | Importance of Software Engineering In Software DevelopmentLondon Atil | Importance of Software Engineering In Software Development
London Atil | Importance of Software Engineering In Software Development
 

Recently uploaded

UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Recently uploaded (20)

UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 

London Atil | Data Communication & Computer Network

  • 3. Analysis, design, implementation, and usage of local, wide-area, and mobile networks that connect computers are all included in the discipline of networking and communication. The Internet is a network that enables communication between almost all computers around the globe.
  • 4. Through a mix of infrared light signals, radio wave broadcasts, telephone lines, television cables, and satellite links, a computer network connects computers. The difficulty for computer scientists has been to create protocols (standardized guidelines for the structure and exchange of messages), which enable processes running on host computers to interpret the signals they receive and to have meaningful "conversations" to carry out tasks on behalf of users.
  • 5. There is a worldwide movement to standardize procedures. The main issue has been the need for system components (computers) to be "open" since, in the absence of such, different types of machines and operating systems would not be able to interact with one another.
  • 6. The physical layer, which contains the rules for the transmission of bits through a physical link, is at the bottom of the protocol. The data-link layer manages "packets" of data that are a defined size and improves dependability through flow control and error detection bits. Messages are divided into standard-size packets by the network and transport layers, which then route them to their final locations.
  • 7. Distributed systems, in which computers connected by a network share data and processing responsibilities, were also produced by the development of networks and communication protocols. For instance, a distributed database system has a database that is dispersed over (or duplicated across) many network nodes. At "mirror sites," data are replicated, which can increase availability and dependability. A distributed DBMS controls a database whose elements are dispersed over several networked computers.
  • 8. A client-server network is a distributed system in which users connect to a single computer (the server) through the network from their computers to access the database (the clients). Each client independently and without knowledge of the presence of other clients accessing the same database uses the server to supply data and reply to requests from each client.
  • 9. Peer-to-peer networks are another well-liked variety of distributed systems. In contrast to client-server networks, peer-to-peer networks operate under the premise that any connected computer (or user) is capable of serving both clients and clients, making every member of the network a peer.
  • 10. Thank You For Your Time