SlideShare a Scribd company logo
NETWORK
INTRODUCTION,TYPE
1
1
Prepared by: Mir Omranudin Abhar
Email : MirOmran@Gmail.com
Fall ,2019
Introduction- [Netwrok]
2
Connectivity of two or more than two devices so that they can
communicate to exchange resources and share information is called
a Network .
Introduction- [Netwrok]
3
• A network is a combination of hardware and software that sends
data from one location to another.
• The hardware consists of the physical equipment that carries
signals from one point of the network to another.
• The software consists of instruction sets that make possible the
services that we expect from a network.
Introduction- [Netwrok]
4
Connectivity: Connectivity is due to hardware ,Printers, Scanners,
faxes telephone and video-conferencing
Introduction- [Netwrok]
5
Communication: Communication is due to software, Data, files,
applications , Documents, Email and messaging, websites, Database
and Music.
Introduction- [Wired Netwrok]
6
Wired technology is more associated with wired communication.
Wired communication refers to the transmission of data over a wire-
based communication technology.
Introduction- [Wireless Netwrok]
7
The term wireless refers to the communication of information over a
distance, without requiring wires, cables or electrical conductors.
Introduction- [Internetwork]
8
• An internetwork can be defined as two or more computer networks
which are connected together, using Network Routers.
• Each network in an Internetwork has its own Network Address,
which is different from other networks inside the Internetwork.
• Internetwork allows different users at different geographical
locations of an organization to share data, resources and to
communicate
Introduction- [Internetwork]
9
Type of Internetwork:
1. Internet: Internet is a worldwide, publicly accessible computer
network of interconnected computer network.
2. Intranet: An intranet is a private network that is contained
within an enterprise.
Introduction- [Internetwork]
10
Type of Internetwork:
3. Extranet: An extranet can be viewed as part of a company's
intranet that is extended to users outside the company like
suppliers, vendors, partners, customers, or other business
associates.
Categorize - [Netwrok]→ [𝑆𝑖𝑧𝑒]
11
1. [PAN] Personal Area Network
2. [LAN] Local Area Network
3. [CAN] Campus Area Network
4. [MAN] Metroplitan Area Network
5. [WAN] Wide Area Network
1
[Size]→ [Personal Area Netwok]
12
[Size]→ [Local Area Network]
13
[Size]→ [Campus Area Network]
14
[Size]→ [Metroplitan Area Network]
15
[Size]→ [Wide Ar𝑒𝑎 𝑁𝑒𝑡𝑤𝑟𝑜𝑘]
16
Categorize –
[Netwrok]→ 𝐴𝑟𝑐ℎ𝑖𝑡𝑒𝑐𝑡𝑢𝑟𝑒
17
1. Peer to Peer (Work Group)
2. Server Based (Client / Server)
2
[Architecture]→ Peer to Peer (Work Group)
18
A peer-to-peer (P2P) network is group of computers, each of which
acts as a node for sharing files within the group.
[Architecture]→ Server Based (Client / Server)
19
A Server-based network is a network in which network security and
storage are managed centrally by one or more servers.
Categorize – [Netwrok]→ Topology
20
1. Bus Technology
2. Ring Technology
3. Star Technology
4. Mesh Technology
5. Tree Technology
6. Hybrid Technology
3
[Topology]→ Bus Technology
21
A bus network is an arrangement in a
local area network (LAN) in which
each node (workstation or other
device) is connected to a main cable or
link called the bus.
[Topology]→ Ring Technology
22
A ring network is a local area network
(LAN) in which the nodes (workstations
or other devices) are connected in a
closed loop configuration.
[Topology]→ Star Technology
23
A star network is a local area network
(LAN) in which all nodes (workstations
or other devices) are directly connected
to a common central computer.
[Topology]→ Mesh Technology
24
The mesh network topology links nodes
with connections so that multiple paths
between at least some points of the
network are available.
The Internet is a mesh network.
[Topology]→ Tree Technology
25
The tree network topology, also
called a star of stars, is a network
where star topologies are
themselves connected in a star
configuration.
[Topology]→ Hybrid Technology
26
Categorize –
[Netwrok]→ Delivery Schemes
27
1. Unicast
2. Broadcast
3. Multicast
4. Anycast
5. Geocast
4
[Delivery Schemes]→ Unicast
28
[Delivery Schemes]→ Broadcast
29
[Delivery Schemes]→ Multicast
30
[Delivery Schemes]→ Anycast
31
[Delivery Schemes]→ Geocast
32
[Netwrok]→ Network Devices
33
Network devices, or networking hardware, are physical devices that
are required for communication and interaction between hardware
on a computer network.
[Network Devices]→ Type
34
1. Passive Networking Hardware
2. Active Networking Hardware
[Network Devices]→ Passive
35
Passive Networking Hardware are those parts of computer network
that are involved in data transmission in the network, but they don’t
change or affect the data.
Passive networking components are an essential part of any computer
network.
[Network Devices]→ Passive
36
[Network Devices]→ Active
37
Active Networking Hardware comprises the parts of a computer
network that in some way actively work with signals in the network.
[Netwrok]→ Active Devices
38
1. Network Interface Card
2. Repeater
3. Hup
4. Switch
5. Bridge
6. Router
[Netwrok Devices] → NIC
39
Network Interface Card
[Netwrok Devices] → Repeater
40
Repeater
[Netwrok Devices] → H𝑢𝑝
41
Hup
[Netwrok Devices] → Bridge
42
Bridge
[Netwrok Devices] → Bridge
43
Bridge
[Netwrok Devices] → Switch
44
Switch
[Netwrok Devices] → Hup & Switch
45
Switch Hup
[Netwrok Devices] → Router
46
Router
[Netwrok] → Transmission Modes
47
Transmission mode means transferring of data between two
devices. It is also known as communication mode.
There are three types of transmission mode:-
1. Simplex Mode
2. Half Duplex Mode
3. Full Duplex Mode
[Transmission Modes] → Simplex Mode
48
In Simplex mode, the communication is unidirectional, as on a
one-way street. Only one of the two devices on a link can transmit,
the other can only receive. The simplex mode can use the entire
capacity of the channel to send data in one direction.
[Transmission Modes] → Simplex Mode
49
[Transmission Modes] → Half Duplex
50
In half-duplex mode, each station can both transmit and receive,
but not at the same time.
[Transmission Modes] → Half Duplex
51
[Transmission Modes] → Full Duplex
52
In the full duplex mode, both the connected devices can send as
well as receive data at the same time
[Transmission Modes] → Full Duplex
53
Question
.1
ISP(Internet Service Provider)
‫ست؟‬‫چی‬
.2
DSL (Digital Subscriber Line)
‫ست‬‫چی‬
‫و‬
‫به‬
‫چی‬
‫منظور‬
‫تفاده‬‫س‬‫ا‬
‫شود؟‬‫می‬
.3
Categories
‫بل‬‫ی‬‫ک‬
UTP
‫کدام‬
‫ها‬
‫ند‬‫ا‬
‫اب‬
‫شخصات‬‫م‬
‫و‬
‫متفاوت‬
‫ها‬
‫هر‬
‫یک‬
‫ا‬‫ر‬‫ان‬
‫ید؟‬‫س‬‫نو‬‫ب‬
.4
Dial-up
‫ست؟‬‫چی‬
.5
‫در‬
Topology
‫های‬
Ring
‫و‬
Bus
‫از‬
‫کدام‬
‫نوع‬
‫بل‬‫ی‬‫ک‬
‫تفاده‬‫س‬‫ا‬
‫شود؟‬‫می‬
54
Question
.6
Circuit Switching
‫اب‬
Pocket Switching
‫از‬
‫مه‬
‫چه‬
‫فرق‬
‫دارد‬
‫اب‬
‫مثال‬
‫احض‬‫و‬
‫ید‬‫ز‬‫سا‬
‫؟‬
.7
‫عدد‬
156
‫ا‬‫ر‬
‫از‬
‫مت‬‫س‬‫سی‬
‫اعداد‬
‫قاعده‬
10
‫به‬
‫مت‬‫س‬‫سی‬
‫اعداد‬
‫ابیرنی‬
‫بدیل‬‫ت‬
‫مناید‬
‫؟‬
.8
‫عدد‬
1000111
‫ا‬‫ر‬
,
‫از‬
‫مت‬‫س‬‫سی‬
‫اعداد‬
‫ابیرنی‬
‫به‬
‫مت‬‫س‬‫سی‬
‫اعداد‬
‫قاعده‬
10
‫بدیل‬‫ت‬
‫مناید؟‬
.9
Connection oriented
‫و‬
Connectionless
‫ست؟‬‫چی‬
‫و‬
‫ابمه‬
‫چه‬
‫تفاوت‬
‫ند؟‬‫ر‬‫دا‬
.10
VSAT
‫ست‬‫چی‬
‫و‬
‫به‬
‫چه‬
‫هدف‬
‫یت‬‫ل‬‫فعا‬
‫یکند؟‬‫م‬
55

More Related Content

What's hot

Topic 2.2 network protocol
Topic 2.2 network protocolTopic 2.2 network protocol
Topic 2.2 network protocol
Atika Zaimi
 
Sept 2017 introduction
Sept 2017   introductionSept 2017   introduction
Sept 2017 introduction
shahin raj
 
CS101- Introduction to Computing- Lecture 27
CS101- Introduction to Computing- Lecture 27CS101- Introduction to Computing- Lecture 27
CS101- Introduction to Computing- Lecture 27
Bilal Ahmed
 
Sept 2017 topologies and communication media
Sept 2017   topologies and communication mediaSept 2017   topologies and communication media
Sept 2017 topologies and communication media
shahin raj
 
Network basic ppt
Network basic pptNetwork basic ppt
Network basic ppt
arun kumar
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer network
Atika Zaimi
 
Data Communication & computer network: Channel types
Data Communication & computer network: Channel types Data Communication & computer network: Channel types
Data Communication & computer network: Channel types
Dr Rajiv Srivastava
 
12 ipt 0303 transmitting and receiving
12 ipt 0303   transmitting and receiving12 ipt 0303   transmitting and receiving
12 ipt 0303 transmitting and receiving
ctedds
 
MVA slides lesson 5
MVA slides lesson 5MVA slides lesson 5
98 366 mva slides lesson 7
98 366 mva slides lesson 798 366 mva slides lesson 7
98 366 mva slides lesson 7
suddenven
 
Types of network topology
Types of network topologyTypes of network topology
Types of network topology
ShofiqulIslam38
 
1. introduction data comm
1. introduction data comm1. introduction data comm
1. introduction data comm
Humayoun Kabir
 
Chapter 3 networking and internetworking
Chapter 3 networking and internetworkingChapter 3 networking and internetworking
Chapter 3 networking and internetworking
AbDul ThaYyal
 
12 ipt 0301: Characteristics of a Communication System
12 ipt 0301: Characteristics of a Communication System12 ipt 0301: Characteristics of a Communication System
12 ipt 0301: Characteristics of a Communication System
ctedds
 
Network security chapter 6 and 7 internet architecture
Network security chapter  6 and 7 internet   architectureNetwork security chapter  6 and 7 internet   architecture
Network security chapter 6 and 7 internet architecture
Muhammad ismail Shah
 
MVA slides lesson 2
MVA slides lesson 2MVA slides lesson 2
Transmission modes
Transmission modesTransmission modes
Transmission modes
Manaswi Sharma
 
Data communication and Networks
Data communication and NetworksData communication and Networks
Data communication and Networks
Ksathyasathya
 
Dc1 t1
Dc1 t1Dc1 t1
Topic 2.1 network communication using osi model part1
Topic 2.1 network communication using osi   model part1Topic 2.1 network communication using osi   model part1
Topic 2.1 network communication using osi model part1
Atika Zaimi
 

What's hot (20)

Topic 2.2 network protocol
Topic 2.2 network protocolTopic 2.2 network protocol
Topic 2.2 network protocol
 
Sept 2017 introduction
Sept 2017   introductionSept 2017   introduction
Sept 2017 introduction
 
CS101- Introduction to Computing- Lecture 27
CS101- Introduction to Computing- Lecture 27CS101- Introduction to Computing- Lecture 27
CS101- Introduction to Computing- Lecture 27
 
Sept 2017 topologies and communication media
Sept 2017   topologies and communication mediaSept 2017   topologies and communication media
Sept 2017 topologies and communication media
 
Network basic ppt
Network basic pptNetwork basic ppt
Network basic ppt
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer network
 
Data Communication & computer network: Channel types
Data Communication & computer network: Channel types Data Communication & computer network: Channel types
Data Communication & computer network: Channel types
 
12 ipt 0303 transmitting and receiving
12 ipt 0303   transmitting and receiving12 ipt 0303   transmitting and receiving
12 ipt 0303 transmitting and receiving
 
MVA slides lesson 5
MVA slides lesson 5MVA slides lesson 5
MVA slides lesson 5
 
98 366 mva slides lesson 7
98 366 mva slides lesson 798 366 mva slides lesson 7
98 366 mva slides lesson 7
 
Types of network topology
Types of network topologyTypes of network topology
Types of network topology
 
1. introduction data comm
1. introduction data comm1. introduction data comm
1. introduction data comm
 
Chapter 3 networking and internetworking
Chapter 3 networking and internetworkingChapter 3 networking and internetworking
Chapter 3 networking and internetworking
 
12 ipt 0301: Characteristics of a Communication System
12 ipt 0301: Characteristics of a Communication System12 ipt 0301: Characteristics of a Communication System
12 ipt 0301: Characteristics of a Communication System
 
Network security chapter 6 and 7 internet architecture
Network security chapter  6 and 7 internet   architectureNetwork security chapter  6 and 7 internet   architecture
Network security chapter 6 and 7 internet architecture
 
MVA slides lesson 2
MVA slides lesson 2MVA slides lesson 2
MVA slides lesson 2
 
Transmission modes
Transmission modesTransmission modes
Transmission modes
 
Data communication and Networks
Data communication and NetworksData communication and Networks
Data communication and Networks
 
Dc1 t1
Dc1 t1Dc1 t1
Dc1 t1
 
Topic 2.1 network communication using osi model part1
Topic 2.1 network communication using osi   model part1Topic 2.1 network communication using osi   model part1
Topic 2.1 network communication using osi model part1
 

Similar to Net 1

Introduction of computer networks
Introduction of computer networksIntroduction of computer networks
Introduction of computer networks
AlidHasan4
 
Computer Network Second Edition
Computer Network Second EditionComputer Network Second Edition
Computer Network Second Edition
Md Saylab
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
Kate Campbell
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
IRJET Journal
 
Computer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsComputer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber Ethics
Subas Paudel
 
Computer networking
Computer networkingComputer networking
Computer networking
Tapan Khilar
 
IARE_CN_PPT_0 (1).pdf
IARE_CN_PPT_0 (1).pdfIARE_CN_PPT_0 (1).pdf
IARE_CN_PPT_0 (1).pdf
DebaComedyClub
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
Kak Yong
 
Basics of Networks ,Advantages and Disadvantages
Basics of  Networks ,Advantages and DisadvantagesBasics of  Networks ,Advantages and Disadvantages
Basics of Networks ,Advantages and Disadvantages
sabari Giri
 
Communicating-Digital-Content.pptx
Communicating-Digital-Content.pptxCommunicating-Digital-Content.pptx
Communicating-Digital-Content.pptx
AdrianVANTOPINA
 
Module 1 CN -new.pptx
Module 1 CN -new.pptxModule 1 CN -new.pptx
Module 1 CN -new.pptx
DrPreethiD1
 
Networking Components
Networking ComponentsNetworking Components
Networking Components
AkNirojan
 
Module 1 CN -new.pptx
Module 1 CN -new.pptxModule 1 CN -new.pptx
Module 1 CN -new.pptx
DrPreethiD1
 
PST SC015 Chapter 3 Internet Technology (I) 2017/2018
PST SC015 Chapter 3 Internet Technology (I)  2017/2018PST SC015 Chapter 3 Internet Technology (I)  2017/2018
PST SC015 Chapter 3 Internet Technology (I) 2017/2018
Fizaril Amzari Omar
 
Book1 class 8.pptx of networking concepts.pptx
Book1 class 8.pptx of networking concepts.pptxBook1 class 8.pptx of networking concepts.pptx
Book1 class 8.pptx of networking concepts.pptx
nutanm610
 
Networking
NetworkingNetworking
Networking
Joseph Zacharia
 
Computer network
Computer networkComputer network
Computer network
NajmulIslam38
 
Computer network note
Computer network noteComputer network note
Computer network note
MdAnikKhan
 
Introduction to Computer Network
Introduction to Computer NetworkIntroduction to Computer Network
Introduction to Computer Network
Adetula Bunmi
 
Class viii ch-1 networking concepts
Class  viii ch-1 networking conceptsClass  viii ch-1 networking concepts
Class viii ch-1 networking concepts
jessandy
 

Similar to Net 1 (20)

Introduction of computer networks
Introduction of computer networksIntroduction of computer networks
Introduction of computer networks
 
Computer Network Second Edition
Computer Network Second EditionComputer Network Second Edition
Computer Network Second Edition
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
Computer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsComputer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber Ethics
 
Computer networking
Computer networkingComputer networking
Computer networking
 
IARE_CN_PPT_0 (1).pdf
IARE_CN_PPT_0 (1).pdfIARE_CN_PPT_0 (1).pdf
IARE_CN_PPT_0 (1).pdf
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
 
Basics of Networks ,Advantages and Disadvantages
Basics of  Networks ,Advantages and DisadvantagesBasics of  Networks ,Advantages and Disadvantages
Basics of Networks ,Advantages and Disadvantages
 
Communicating-Digital-Content.pptx
Communicating-Digital-Content.pptxCommunicating-Digital-Content.pptx
Communicating-Digital-Content.pptx
 
Module 1 CN -new.pptx
Module 1 CN -new.pptxModule 1 CN -new.pptx
Module 1 CN -new.pptx
 
Networking Components
Networking ComponentsNetworking Components
Networking Components
 
Module 1 CN -new.pptx
Module 1 CN -new.pptxModule 1 CN -new.pptx
Module 1 CN -new.pptx
 
PST SC015 Chapter 3 Internet Technology (I) 2017/2018
PST SC015 Chapter 3 Internet Technology (I)  2017/2018PST SC015 Chapter 3 Internet Technology (I)  2017/2018
PST SC015 Chapter 3 Internet Technology (I) 2017/2018
 
Book1 class 8.pptx of networking concepts.pptx
Book1 class 8.pptx of networking concepts.pptxBook1 class 8.pptx of networking concepts.pptx
Book1 class 8.pptx of networking concepts.pptx
 
Networking
NetworkingNetworking
Networking
 
Computer network
Computer networkComputer network
Computer network
 
Computer network note
Computer network noteComputer network note
Computer network note
 
Introduction to Computer Network
Introduction to Computer NetworkIntroduction to Computer Network
Introduction to Computer Network
 
Class viii ch-1 networking concepts
Class  viii ch-1 networking conceptsClass  viii ch-1 networking concepts
Class viii ch-1 networking concepts
 

More from MirOmranudinAbhar

Dld 2
Dld 2Dld 2
Dld 3
Dld 3Dld 3
Dld 4
Dld 4Dld 4
Dld 1
Dld 1Dld 1
java-13
java-13java-13
java-12
java-12java-12
java-11
java-11java-11
java-10
java-10java-10
java-9
java-9java-9
java-8
java-8java-8
java-7
java-7java-7
java-6
java-6java-6
java-5
java-5java-5
java-4
java-4java-4
java-3
java-3java-3
java-2
java-2java-2
java-1
java-1java-1
Software-0
Software-0Software-0
Software-0
MirOmranudinAbhar
 
Net 6
Net 6Net 6
Net 7
Net 7Net 7

More from MirOmranudinAbhar (20)

Dld 2
Dld 2Dld 2
Dld 2
 
Dld 3
Dld 3Dld 3
Dld 3
 
Dld 4
Dld 4Dld 4
Dld 4
 
Dld 1
Dld 1Dld 1
Dld 1
 
java-13
java-13java-13
java-13
 
java-12
java-12java-12
java-12
 
java-11
java-11java-11
java-11
 
java-10
java-10java-10
java-10
 
java-9
java-9java-9
java-9
 
java-8
java-8java-8
java-8
 
java-7
java-7java-7
java-7
 
java-6
java-6java-6
java-6
 
java-5
java-5java-5
java-5
 
java-4
java-4java-4
java-4
 
java-3
java-3java-3
java-3
 
java-2
java-2java-2
java-2
 
java-1
java-1java-1
java-1
 
Software-0
Software-0Software-0
Software-0
 
Net 6
Net 6Net 6
Net 6
 
Net 7
Net 7Net 7
Net 7
 

Recently uploaded

Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
marufrahmanstratejm
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
Data Hops
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 

Recently uploaded (20)

Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 

Net 1