SlideShare a Scribd company logo
What is a network?
Two or more interconnected
computers.
An office
network
A school
network
A home network
A network is useful for communication
between computers, and for sharing
resources
Communicating Sharing
Chatting Sharing a printer
Video conferencing Sharing storage
Sending e-mail Sharing Files
Playing games Internet connection
Types of networks
LAN
Local Area Network
Local Area Network
On a small area, e.g: within one building
Wide Area Network
How to make a
network?
Networking equipment
Network Interface Card
Network
Cable
Now they can communicate
But what if I have three
computers?
Switch
Switch
workstation
workstation
workstation
workstation
A
B
C
D
E
Switch
back
If workstation B wants to
communicate with workstation C
A WAN is made up of several connected LANs
Wide Area Network
It can also be a group of several WANs, or
some LANs and some WANs
WAN
The Internet is the largest
WAN in the world
How are LANs connected
to make a WAN ?
LAN
LAN
LAN
WAN
Computers and devices
on a network
Clients & Servers
• It is called a Client, because it receives services
from a Server
• A Server is normally a powerful computer, that
provides services to other computers and
devices on a network
Examples of servers
Type Service
Printer server Allows clients to print using one shared printer
Storage server Allows clients to save/store their files on a shared drive
Web server Hosts the web-pages, that are accessed by the clients
Mail server Stores clients mail accounts and inboxes. Allows clients to
send email.
Storage server
Printer server
Giovanni Nick Steve
Brian James
Carola
• A firewall protects your network against
unwanted access.
• A firewall can be a hardware device and it can
be software that is installed on a computer or a
server.
How do you connect your network
to the Internet?
1. Router 2. ISP
The Internet Service Provider, is a company,
that has a very large connection to the
Internet.
Switch
WAN
WAN
LAN
Other types of networks
LAN
Wireless Local Area Network
Bluetooth network
Personal Area Network

More Related Content

What's hot

Introduction To Networking
Introduction To NetworkingIntroduction To Networking
Introduction To Networking
Steven Cahill
 
Basics of Networks ,Advantages and Disadvantages
Basics of  Networks ,Advantages and DisadvantagesBasics of  Networks ,Advantages and Disadvantages
Basics of Networks ,Advantages and Disadvantages
sabari Giri
 
Networking power point
Networking power pointNetworking power point
Networking power point
Keilandra Scruggs
 
lan
 lan lan
COMPUTER NETWORK
COMPUTER NETWORKCOMPUTER NETWORK
Computer networks
Computer networksComputer networks
Computer networks
John Cook
 
Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2
Naruin
 
Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2
ekul
 
Lan and wan
Lan and wanLan and wan
Lan and wan
Ankit Kumar
 
Types of network
Types of networkTypes of network
Types of network
IGZ Software house
 
Network Resources
Network ResourcesNetwork Resources
Network Resources
guest42fe285
 
How the-internet-works
How the-internet-worksHow the-internet-works
How the-internet-works
Rashmi Kaul
 
Types of network
Types of networkTypes of network
Types of network
ishjari
 

What's hot (13)

Introduction To Networking
Introduction To NetworkingIntroduction To Networking
Introduction To Networking
 
Basics of Networks ,Advantages and Disadvantages
Basics of  Networks ,Advantages and DisadvantagesBasics of  Networks ,Advantages and Disadvantages
Basics of Networks ,Advantages and Disadvantages
 
Networking power point
Networking power pointNetworking power point
Networking power point
 
lan
 lan lan
lan
 
COMPUTER NETWORK
COMPUTER NETWORKCOMPUTER NETWORK
COMPUTER NETWORK
 
Computer networks
Computer networksComputer networks
Computer networks
 
Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2
 
Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2
 
Lan and wan
Lan and wanLan and wan
Lan and wan
 
Types of network
Types of networkTypes of network
Types of network
 
Network Resources
Network ResourcesNetwork Resources
Network Resources
 
How the-internet-works
How the-internet-worksHow the-internet-works
How the-internet-works
 
Types of network
Types of networkTypes of network
Types of network
 

Viewers also liked

Data mining maximumlikelihood
Data mining maximumlikelihoodData mining maximumlikelihood
Data mining maximumlikelihood
Luis Goldster
 
Presentation Travel CRM (English)
Presentation Travel CRM (English)Presentation Travel CRM (English)
Presentation Travel CRM (English)
Andrey Voloschuk
 
Alex and dela
Alex and delaAlex and dela
Alex and dela
Jami Joyner
 
Exception
ExceptionException
Exception
Harry Potter
 
The applications of blockchain and crypto currencies
The applications of blockchain and crypto currenciesThe applications of blockchain and crypto currencies
The applications of blockchain and crypto currencies
Grzegorz Gawron
 
Babasaheb - Rahuri (1)
Babasaheb - Rahuri (1)Babasaheb - Rahuri (1)
Babasaheb - Rahuri (1)
babasaheb ile
 
Qué es jdbc
Qué es jdbcQué es jdbc
Qué es jdbc
Jesus NM
 
S I T E & I T S E N V I R O N M E N T S
S I T E   &    I T S   E N V I R O N M E N T SS I T E   &    I T S   E N V I R O N M E N T S
S I T E & I T S E N V I R O N M E N T S
sivakumar k
 
Stacks queues lists
Stacks queues listsStacks queues lists
Stacks queues lists
Harry Potter
 
Digital Marketing Guide for Hotels
Digital Marketing Guide for HotelsDigital Marketing Guide for Hotels
Digital Marketing Guide for Hotels
Tarun Mitra
 
Abstract class
Abstract classAbstract class
Abstract class
Young Alista
 
Optimizing shared caches in chip multiprocessors
Optimizing shared caches in chip multiprocessorsOptimizing shared caches in chip multiprocessors
Optimizing shared caches in chip multiprocessors
Young Alista
 
Extending burp with python
Extending burp with pythonExtending burp with python
Extending burp with python
Young Alista
 

Viewers also liked (13)

Data mining maximumlikelihood
Data mining maximumlikelihoodData mining maximumlikelihood
Data mining maximumlikelihood
 
Presentation Travel CRM (English)
Presentation Travel CRM (English)Presentation Travel CRM (English)
Presentation Travel CRM (English)
 
Alex and dela
Alex and delaAlex and dela
Alex and dela
 
Exception
ExceptionException
Exception
 
The applications of blockchain and crypto currencies
The applications of blockchain and crypto currenciesThe applications of blockchain and crypto currencies
The applications of blockchain and crypto currencies
 
Babasaheb - Rahuri (1)
Babasaheb - Rahuri (1)Babasaheb - Rahuri (1)
Babasaheb - Rahuri (1)
 
Qué es jdbc
Qué es jdbcQué es jdbc
Qué es jdbc
 
S I T E & I T S E N V I R O N M E N T S
S I T E   &    I T S   E N V I R O N M E N T SS I T E   &    I T S   E N V I R O N M E N T S
S I T E & I T S E N V I R O N M E N T S
 
Stacks queues lists
Stacks queues listsStacks queues lists
Stacks queues lists
 
Digital Marketing Guide for Hotels
Digital Marketing Guide for HotelsDigital Marketing Guide for Hotels
Digital Marketing Guide for Hotels
 
Abstract class
Abstract classAbstract class
Abstract class
 
Optimizing shared caches in chip multiprocessors
Optimizing shared caches in chip multiprocessorsOptimizing shared caches in chip multiprocessors
Optimizing shared caches in chip multiprocessors
 
Extending burp with python
Extending burp with pythonExtending burp with python
Extending burp with python
 

Similar to Network

Computer networks
Computer networks Computer networks
Computer networks
mamanning2
 
Internet and Networking
Internet and NetworkingInternet and Networking
Internet and Networking
nhumar
 
LAN.
LAN.LAN.
Computer networks short note (version 8)
Computer networks short note (version 8)Computer networks short note (version 8)
Computer networks short note (version 8)
Nimmi Weeraddana
 
Computer networks
Computer networksComputer networks
Computer networks
Billy Jean Morado
 
Int 2 networks 2010
Int 2 networks 2010Int 2 networks 2010
Int 2 networks 2010
iarthur
 
BASIC_COMPUTER_NETWORKING (1).pdf
BASIC_COMPUTER_NETWORKING (1).pdfBASIC_COMPUTER_NETWORKING (1).pdf
BASIC_COMPUTER_NETWORKING (1).pdf
JafarHussain48
 
About Networking
About NetworkingAbout Networking
About Networking
RakeshHalder6
 
Networking Concepts
Networking ConceptsNetworking Concepts
Networking Concepts
Vishal Krishna
 
Networking
NetworkingNetworking
Networking
Gopal Acharya
 
Computing 9
Computing 9Computing 9
Computing 9
sufyanmaqsood
 
Computer network 1
Computer network 1Computer network 1
Computer network 1
gondwana university
 
computer networking by ashba fatima
computer networking by ashba fatimacomputer networking by ashba fatima
computer networking by ashba fatima
AshbaFatima1
 
Computer networks
Computer networksComputer networks
Dasar komputer chapter8
Dasar komputer chapter8Dasar komputer chapter8
Dasar komputer chapter8
teknik komputer ui
 
Computer networks
Computer networks   Computer networks
Computer networks
SakshiGupta964978
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
AnushaJagadeesh4
 
Imd Corporate Presentation Nov 2010
Imd Corporate Presentation   Nov 2010Imd Corporate Presentation   Nov 2010
Imd Corporate Presentation Nov 2010
anneke_blaauw
 
M4 - Lesson 5 - Networks
M4 - Lesson 5 - NetworksM4 - Lesson 5 - Networks
M4 - Lesson 5 - Networks
Jamie Hutt
 
Types of network
Types of networkTypes of network
Types of network
findclick read
 

Similar to Network (20)

Computer networks
Computer networks Computer networks
Computer networks
 
Internet and Networking
Internet and NetworkingInternet and Networking
Internet and Networking
 
LAN.
LAN.LAN.
LAN.
 
Computer networks short note (version 8)
Computer networks short note (version 8)Computer networks short note (version 8)
Computer networks short note (version 8)
 
Computer networks
Computer networksComputer networks
Computer networks
 
Int 2 networks 2010
Int 2 networks 2010Int 2 networks 2010
Int 2 networks 2010
 
BASIC_COMPUTER_NETWORKING (1).pdf
BASIC_COMPUTER_NETWORKING (1).pdfBASIC_COMPUTER_NETWORKING (1).pdf
BASIC_COMPUTER_NETWORKING (1).pdf
 
About Networking
About NetworkingAbout Networking
About Networking
 
Networking Concepts
Networking ConceptsNetworking Concepts
Networking Concepts
 
Networking
NetworkingNetworking
Networking
 
Computing 9
Computing 9Computing 9
Computing 9
 
Computer network 1
Computer network 1Computer network 1
Computer network 1
 
computer networking by ashba fatima
computer networking by ashba fatimacomputer networking by ashba fatima
computer networking by ashba fatima
 
Computer networks
Computer networksComputer networks
Computer networks
 
Dasar komputer chapter8
Dasar komputer chapter8Dasar komputer chapter8
Dasar komputer chapter8
 
Computer networks
Computer networks   Computer networks
Computer networks
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
 
Imd Corporate Presentation Nov 2010
Imd Corporate Presentation   Nov 2010Imd Corporate Presentation   Nov 2010
Imd Corporate Presentation Nov 2010
 
M4 - Lesson 5 - Networks
M4 - Lesson 5 - NetworksM4 - Lesson 5 - Networks
M4 - Lesson 5 - Networks
 
Types of network
Types of networkTypes of network
Types of network
 

More from James Wong

Data race
Data raceData race
Data race
James Wong
 
Multi threaded rtos
Multi threaded rtosMulti threaded rtos
Multi threaded rtos
James Wong
 
Recursion
RecursionRecursion
Recursion
James Wong
 
Business analytics and data mining
Business analytics and data miningBusiness analytics and data mining
Business analytics and data mining
James Wong
 
Data mining and knowledge discovery
Data mining and knowledge discoveryData mining and knowledge discovery
Data mining and knowledge discovery
James Wong
 
Cache recap
Cache recapCache recap
Cache recap
James Wong
 
Big picture of data mining
Big picture of data miningBig picture of data mining
Big picture of data mining
James Wong
 
How analysis services caching works
How analysis services caching worksHow analysis services caching works
How analysis services caching works
James Wong
 
Optimizing shared caches in chip multiprocessors
Optimizing shared caches in chip multiprocessorsOptimizing shared caches in chip multiprocessors
Optimizing shared caches in chip multiprocessors
James Wong
 
Directory based cache coherence
Directory based cache coherenceDirectory based cache coherence
Directory based cache coherence
James Wong
 
Abstract data types
Abstract data typesAbstract data types
Abstract data types
James Wong
 
Abstraction file
Abstraction fileAbstraction file
Abstraction file
James Wong
 
Hardware managed cache
Hardware managed cacheHardware managed cache
Hardware managed cache
James Wong
 
Object model
Object modelObject model
Object model
James Wong
 
Abstract class
Abstract classAbstract class
Abstract class
James Wong
 
Object oriented analysis
Object oriented analysisObject oriented analysis
Object oriented analysis
James Wong
 
Concurrency with java
Concurrency with javaConcurrency with java
Concurrency with java
James Wong
 
Data structures and algorithms
Data structures and algorithmsData structures and algorithms
Data structures and algorithms
James Wong
 
Cobol, lisp, and python
Cobol, lisp, and pythonCobol, lisp, and python
Cobol, lisp, and python
James Wong
 
Inheritance
InheritanceInheritance
Inheritance
James Wong
 

More from James Wong (20)

Data race
Data raceData race
Data race
 
Multi threaded rtos
Multi threaded rtosMulti threaded rtos
Multi threaded rtos
 
Recursion
RecursionRecursion
Recursion
 
Business analytics and data mining
Business analytics and data miningBusiness analytics and data mining
Business analytics and data mining
 
Data mining and knowledge discovery
Data mining and knowledge discoveryData mining and knowledge discovery
Data mining and knowledge discovery
 
Cache recap
Cache recapCache recap
Cache recap
 
Big picture of data mining
Big picture of data miningBig picture of data mining
Big picture of data mining
 
How analysis services caching works
How analysis services caching worksHow analysis services caching works
How analysis services caching works
 
Optimizing shared caches in chip multiprocessors
Optimizing shared caches in chip multiprocessorsOptimizing shared caches in chip multiprocessors
Optimizing shared caches in chip multiprocessors
 
Directory based cache coherence
Directory based cache coherenceDirectory based cache coherence
Directory based cache coherence
 
Abstract data types
Abstract data typesAbstract data types
Abstract data types
 
Abstraction file
Abstraction fileAbstraction file
Abstraction file
 
Hardware managed cache
Hardware managed cacheHardware managed cache
Hardware managed cache
 
Object model
Object modelObject model
Object model
 
Abstract class
Abstract classAbstract class
Abstract class
 
Object oriented analysis
Object oriented analysisObject oriented analysis
Object oriented analysis
 
Concurrency with java
Concurrency with javaConcurrency with java
Concurrency with java
 
Data structures and algorithms
Data structures and algorithmsData structures and algorithms
Data structures and algorithms
 
Cobol, lisp, and python
Cobol, lisp, and pythonCobol, lisp, and python
Cobol, lisp, and python
 
Inheritance
InheritanceInheritance
Inheritance
 

Recently uploaded

GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 

Recently uploaded (20)

GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 

Network

Editor's Notes

  1. A network is a set of computers that are connected together
  2. Like computers in an office
  3. Or in a school lab
  4. Or a home network
  5. Name and logo Bluetooth logo The word "Bluetooth" is an anglicized version of the Scandinavian Blåtand/Blåtann, the epithet of the tenth-century king Harald I of Denmark and parts of Norway who united dissonant Danish tribes into a single kingdom. The idea of this name was proposed by Jim Kardach who developed a system that would allow mobile phones to communicate with computers (at the time he was reading Frans Gunnar Bengtsson's historical novel The Long Ships about Vikings and king Harald Bluetooth).[5] The implication is that Bluetooth does the same with communications protocols, uniting them into one universal standard.[6][7][8] The Bluetooth logo is a bind rune merging the Younger Futhark runes  (Hagall) (ᚼ) and  (Bjarkan) (ᛒ), Harald's initials.