SlideShare a Scribd company logo
What is a network?
Two or more interconnected
computers.
An office
network
A school
network
A home network
A network is useful for communication
between computers, and for sharing
resources
Communicating Sharing
Chatting Sharing a printer
Video conferencing Sharing storage
Sending e-mail Sharing Files
Playing games Internet connection
Types of networks
LAN
Local Area Network
Local Area Network
On a small area, e.g: within one building
Wide Area Network
How to make a
network?
Networking equipment
Network Interface Card
Network
Cable
Now they can communicate
But what if I have three
computers?
Switch
Switch
workstation
workstation
workstation
workstation
A
B
C
D
E
Switch
back
If workstation B wants to
communicate with workstation C
A WAN is made up of several connected LANs
Wide Area Network
It can also be a group of several WANs, or
some LANs and some WANs
WAN
The Internet is the largest
WAN in the world
How are LANs connected
to make a WAN ?
LAN
LAN
LAN
WAN
Computers and devices
on a network
Clients & Servers
• It is called a Client, because it receives services
from a Server
• A Server is normally a powerful computer, that
provides services to other computers and
devices on a network
Examples of servers
Type Service
Printer server Allows clients to print using one shared printer
Storage server Allows clients to save/store their files on a shared drive
Web server Hosts the web-pages, that are accessed by the clients
Mail server Stores clients mail accounts and inboxes. Allows clients to
send email.
Storage server
Printer server
Giovanni Nick Steve
Brian James
Carola
• A firewall protects your network against
unwanted access.
• A firewall can be a hardware device and it can
be software that is installed on a computer or a
server.
How do you connect your network
to the Internet?
1. Router 2. ISP
The Internet Service Provider, is a company,
that has a very large connection to the
Internet.
Switch
WAN
WAN
LAN
Other types of networks
LAN
Wireless Local Area Network
Bluetooth network
Personal Area Network

More Related Content

What's hot

Introduction To Networking
Introduction To NetworkingIntroduction To Networking
Introduction To NetworkingSteven Cahill
 
Basics of Networks ,Advantages and Disadvantages
Basics of  Networks ,Advantages and DisadvantagesBasics of  Networks ,Advantages and Disadvantages
Basics of Networks ,Advantages and Disadvantages
sabari Giri
 
Networking power point
Networking power pointNetworking power point
Networking power point
Keilandra Scruggs
 
lan
 lan lan
COMPUTER NETWORK
COMPUTER NETWORKCOMPUTER NETWORK
Computer networks
Computer networksComputer networks
Computer networks
John Cook
 
Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2ekul
 
Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2Naruin
 
Types of network
Types of networkTypes of network
Types of network
IGZ Software house
 
How the-internet-works
How the-internet-worksHow the-internet-works
How the-internet-works
Rashmi Kaul
 
Types of network
Types of networkTypes of network
Types of networkishjari
 

What's hot (13)

Introduction To Networking
Introduction To NetworkingIntroduction To Networking
Introduction To Networking
 
Basics of Networks ,Advantages and Disadvantages
Basics of  Networks ,Advantages and DisadvantagesBasics of  Networks ,Advantages and Disadvantages
Basics of Networks ,Advantages and Disadvantages
 
Networking power point
Networking power pointNetworking power point
Networking power point
 
lan
 lan lan
lan
 
COMPUTER NETWORK
COMPUTER NETWORKCOMPUTER NETWORK
COMPUTER NETWORK
 
Computer networks
Computer networksComputer networks
Computer networks
 
Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2
 
Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2
 
Lan and wan
Lan and wanLan and wan
Lan and wan
 
Types of network
Types of networkTypes of network
Types of network
 
Network Resources
Network ResourcesNetwork Resources
Network Resources
 
How the-internet-works
How the-internet-worksHow the-internet-works
How the-internet-works
 
Types of network
Types of networkTypes of network
Types of network
 

Viewers also liked

Marketing and sales dual podium presentation
Marketing and sales  dual podium presentationMarketing and sales  dual podium presentation
Marketing and sales dual podium presentation
Corporate Visions
 
Xpert packages Rate shopper tool
Xpert packages Rate shopper toolXpert packages Rate shopper tool
Xpert packages Rate shopper tool
Erwin ten Kate
 
Make Your Move with CenturyLink
Make Your Move with CenturyLinkMake Your Move with CenturyLink
Make Your Move with CenturyLink
Britney Drotleff
 
Differentiation in a commoditized market: How CenturLink found it, Benda Van ...
Differentiation in a commoditized market: How CenturLink found it, Benda Van ...Differentiation in a commoditized market: How CenturLink found it, Benda Van ...
Differentiation in a commoditized market: How CenturLink found it, Benda Van ...
Corporate Visions
 
Effectively Launching New Products To, and Through, Your Field Organization
Effectively Launching New Products To, and Through, Your Field OrganizationEffectively Launching New Products To, and Through, Your Field Organization
Effectively Launching New Products To, and Through, Your Field Organization
Corporate Visions
 
Data mining maximumlikelihood
Data mining maximumlikelihoodData mining maximumlikelihood
Data mining maximumlikelihood
Young Alista
 
Xml and webdata
Xml and webdataXml and webdata
Xml and webdata
Young Alista
 
Decision analysis
Decision analysisDecision analysis
Decision analysis
James Wong
 
Behaviour drivendevelopment
Behaviour drivendevelopmentBehaviour drivendevelopment
Behaviour drivendevelopment
Luis Goldster
 
Data preprocessing
Data preprocessingData preprocessing
Data preprocessing
Harry Potter
 
Stacks queues lists
Stacks queues listsStacks queues lists
Stacks queues lists
Young Alista
 

Viewers also liked (20)

Marketing and sales dual podium presentation
Marketing and sales  dual podium presentationMarketing and sales  dual podium presentation
Marketing and sales dual podium presentation
 
Xpert packages Rate shopper tool
Xpert packages Rate shopper toolXpert packages Rate shopper tool
Xpert packages Rate shopper tool
 
Make Your Move with CenturyLink
Make Your Move with CenturyLinkMake Your Move with CenturyLink
Make Your Move with CenturyLink
 
Differentiation in a commoditized market: How CenturLink found it, Benda Van ...
Differentiation in a commoditized market: How CenturLink found it, Benda Van ...Differentiation in a commoditized market: How CenturLink found it, Benda Van ...
Differentiation in a commoditized market: How CenturLink found it, Benda Van ...
 
Effectively Launching New Products To, and Through, Your Field Organization
Effectively Launching New Products To, and Through, Your Field OrganizationEffectively Launching New Products To, and Through, Your Field Organization
Effectively Launching New Products To, and Through, Your Field Organization
 
Data mining maximumlikelihood
Data mining maximumlikelihoodData mining maximumlikelihood
Data mining maximumlikelihood
 
Java
JavaJava
Java
 
Exception
ExceptionException
Exception
 
Xml and webdata
Xml and webdataXml and webdata
Xml and webdata
 
Decision analysis
Decision analysisDecision analysis
Decision analysis
 
Big data
Big dataBig data
Big data
 
Linked list
Linked listLinked list
Linked list
 
Java
JavaJava
Java
 
Gm theory
Gm theoryGm theory
Gm theory
 
Behaviour drivendevelopment
Behaviour drivendevelopmentBehaviour drivendevelopment
Behaviour drivendevelopment
 
Data preprocessing
Data preprocessingData preprocessing
Data preprocessing
 
Java
JavaJava
Java
 
Learn ruby intro
Learn ruby introLearn ruby intro
Learn ruby intro
 
Big data
Big dataBig data
Big data
 
Stacks queues lists
Stacks queues listsStacks queues lists
Stacks queues lists
 

Similar to Network

Computer networks
Computer networks Computer networks
Computer networks
mamanning2
 
Internet and Networking
Internet and NetworkingInternet and Networking
Internet and Networking
nhumar
 
Computer networks short note (version 8)
Computer networks short note (version 8)Computer networks short note (version 8)
Computer networks short note (version 8)
Nimmi Weeraddana
 
Computer networks
Computer networksComputer networks
Computer networks
Billy Jean Morado
 
Int 2 networks 2010
Int 2 networks 2010Int 2 networks 2010
Int 2 networks 2010iarthur
 
BASIC_COMPUTER_NETWORKING (1).pdf
BASIC_COMPUTER_NETWORKING (1).pdfBASIC_COMPUTER_NETWORKING (1).pdf
BASIC_COMPUTER_NETWORKING (1).pdf
JafarHussain48
 
About Networking
About NetworkingAbout Networking
About Networking
RakeshHalder6
 
Networking Concepts
Networking ConceptsNetworking Concepts
Networking Concepts
Vishal Krishna
 
Networking
NetworkingNetworking
Networking
Gopal Acharya
 
Computer network 1
Computer network 1Computer network 1
Computer network 1
gondwana university
 
computer networking by ashba fatima
computer networking by ashba fatimacomputer networking by ashba fatima
computer networking by ashba fatima
AshbaFatima1
 
Computer networks
Computer networksComputer networks
Computer networks
Computer networks   Computer networks
Computer networks
SakshiGupta964978
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
AnushaJagadeesh4
 
Imd Corporate Presentation Nov 2010
Imd Corporate Presentation   Nov 2010Imd Corporate Presentation   Nov 2010
Imd Corporate Presentation Nov 2010anneke_blaauw
 
M4 - Lesson 5 - Networks
M4 - Lesson 5 - NetworksM4 - Lesson 5 - Networks
M4 - Lesson 5 - Networks
Jamie Hutt
 
Types of network
Types of networkTypes of network
Types of network
findclick read
 

Similar to Network (20)

Computer networks
Computer networks Computer networks
Computer networks
 
Internet and Networking
Internet and NetworkingInternet and Networking
Internet and Networking
 
LAN.
LAN.LAN.
LAN.
 
Computer networks short note (version 8)
Computer networks short note (version 8)Computer networks short note (version 8)
Computer networks short note (version 8)
 
Computer networks
Computer networksComputer networks
Computer networks
 
Int 2 networks 2010
Int 2 networks 2010Int 2 networks 2010
Int 2 networks 2010
 
BASIC_COMPUTER_NETWORKING (1).pdf
BASIC_COMPUTER_NETWORKING (1).pdfBASIC_COMPUTER_NETWORKING (1).pdf
BASIC_COMPUTER_NETWORKING (1).pdf
 
About Networking
About NetworkingAbout Networking
About Networking
 
Networking Concepts
Networking ConceptsNetworking Concepts
Networking Concepts
 
Networking
NetworkingNetworking
Networking
 
Computing 9
Computing 9Computing 9
Computing 9
 
Computer network 1
Computer network 1Computer network 1
Computer network 1
 
computer networking by ashba fatima
computer networking by ashba fatimacomputer networking by ashba fatima
computer networking by ashba fatima
 
Computer networks
Computer networksComputer networks
Computer networks
 
Dasar komputer chapter8
Dasar komputer chapter8Dasar komputer chapter8
Dasar komputer chapter8
 
Computer networks
Computer networks   Computer networks
Computer networks
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
 
Imd Corporate Presentation Nov 2010
Imd Corporate Presentation   Nov 2010Imd Corporate Presentation   Nov 2010
Imd Corporate Presentation Nov 2010
 
M4 - Lesson 5 - Networks
M4 - Lesson 5 - NetworksM4 - Lesson 5 - Networks
M4 - Lesson 5 - Networks
 
Types of network
Types of networkTypes of network
Types of network
 

More from Luis Goldster

Ruby on rails evaluation
Ruby on rails evaluationRuby on rails evaluation
Ruby on rails evaluation
Luis Goldster
 
Design patterns
Design patternsDesign patterns
Design patterns
Luis Goldster
 
Lisp and scheme i
Lisp and scheme iLisp and scheme i
Lisp and scheme i
Luis Goldster
 
Ado.net & data persistence frameworks
Ado.net & data persistence frameworksAdo.net & data persistence frameworks
Ado.net & data persistence frameworks
Luis Goldster
 
Multithreading models.ppt
Multithreading models.pptMultithreading models.ppt
Multithreading models.ppt
Luis Goldster
 
Business analytics and data mining
Business analytics and data miningBusiness analytics and data mining
Business analytics and data mining
Luis Goldster
 
Big picture of data mining
Big picture of data miningBig picture of data mining
Big picture of data mining
Luis Goldster
 
Data mining and knowledge discovery
Data mining and knowledge discoveryData mining and knowledge discovery
Data mining and knowledge discovery
Luis Goldster
 
Directory based cache coherence
Directory based cache coherenceDirectory based cache coherence
Directory based cache coherence
Luis Goldster
 
Hardware managed cache
Hardware managed cacheHardware managed cache
Hardware managed cache
Luis Goldster
 
How analysis services caching works
How analysis services caching worksHow analysis services caching works
How analysis services caching works
Luis Goldster
 
Abstract data types
Abstract data typesAbstract data types
Abstract data types
Luis Goldster
 
Optimizing shared caches in chip multiprocessors
Optimizing shared caches in chip multiprocessorsOptimizing shared caches in chip multiprocessors
Optimizing shared caches in chip multiprocessors
Luis Goldster
 
Object oriented analysis
Object oriented analysisObject oriented analysis
Object oriented analysis
Luis Goldster
 
Concurrency with java
Concurrency with javaConcurrency with java
Concurrency with java
Luis Goldster
 

More from Luis Goldster (20)

Ruby on rails evaluation
Ruby on rails evaluationRuby on rails evaluation
Ruby on rails evaluation
 
Design patterns
Design patternsDesign patterns
Design patterns
 
Lisp and scheme i
Lisp and scheme iLisp and scheme i
Lisp and scheme i
 
Ado.net & data persistence frameworks
Ado.net & data persistence frameworksAdo.net & data persistence frameworks
Ado.net & data persistence frameworks
 
Multithreading models.ppt
Multithreading models.pptMultithreading models.ppt
Multithreading models.ppt
 
Business analytics and data mining
Business analytics and data miningBusiness analytics and data mining
Business analytics and data mining
 
Big picture of data mining
Big picture of data miningBig picture of data mining
Big picture of data mining
 
Data mining and knowledge discovery
Data mining and knowledge discoveryData mining and knowledge discovery
Data mining and knowledge discovery
 
Cache recap
Cache recapCache recap
Cache recap
 
Directory based cache coherence
Directory based cache coherenceDirectory based cache coherence
Directory based cache coherence
 
Hardware managed cache
Hardware managed cacheHardware managed cache
Hardware managed cache
 
How analysis services caching works
How analysis services caching worksHow analysis services caching works
How analysis services caching works
 
Abstract data types
Abstract data typesAbstract data types
Abstract data types
 
Optimizing shared caches in chip multiprocessors
Optimizing shared caches in chip multiprocessorsOptimizing shared caches in chip multiprocessors
Optimizing shared caches in chip multiprocessors
 
Api crash
Api crashApi crash
Api crash
 
Object model
Object modelObject model
Object model
 
Abstraction file
Abstraction fileAbstraction file
Abstraction file
 
Object oriented analysis
Object oriented analysisObject oriented analysis
Object oriented analysis
 
Abstract class
Abstract classAbstract class
Abstract class
 
Concurrency with java
Concurrency with javaConcurrency with java
Concurrency with java
 

Recently uploaded

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 

Recently uploaded (20)

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 

Network

Editor's Notes

  1. A network is a set of computers that are connected together
  2. Like computers in an office
  3. Or in a school lab
  4. Or a home network
  5. Name and logo Bluetooth logo The word "Bluetooth" is an anglicized version of the Scandinavian Blåtand/Blåtann, the epithet of the tenth-century king Harald I of Denmark and parts of Norway who united dissonant Danish tribes into a single kingdom. The idea of this name was proposed by Jim Kardach who developed a system that would allow mobile phones to communicate with computers (at the time he was reading Frans Gunnar Bengtsson's historical novel The Long Ships about Vikings and king Harald Bluetooth).[5] The implication is that Bluetooth does the same with communications protocols, uniting them into one universal standard.[6][7][8] The Bluetooth logo is a bind rune merging the Younger Futhark runes  (Hagall) (ᚼ) and  (Bjarkan) (ᛒ), Harald's initials.