SlideShare a Scribd company logo
NETWORK
BY – AKASH SINGH
WHAT IS A NETWORK ?
• Network, in computer science, a group of computers and associated
devices that are connected by communications facilities.
• Network is an inter connected collection of autonomous computers.
• When two or more computers are joined together so that they are
capable of exchanging information , they form a network.
NEED OF NETWORKING ?
• Resource sharing - Through a network , data , s/w and h/w
resources can be shared irrespective of the physical location of the
resources and the user.
• Reliability – A file can have its copies on two or more computers of
the network.
• Reduced Cost – Sharing resources reduces the cost
• Fast Communication – Information can be exchanged at a very fast
speed.
WHAT IS INTERNET ?
Internet is worldwide network of computer networks.
How does it work ?
• Most computers are not connected directly to the internet .
• They are connected to smaller networks .
• Which are connected through gateways to the internet
backbone .
WHAT IS A GATEWAY ?
• Gateway is a device that connects
dissimilar networks.
• A backbone is a central interconnecting
structure that connects one or more
networks just like the trunk of a tree.
FEW THINGS RELATED TO NETWORK
• Workstation or Nodes : refers
to a computer that are attached
to a network .
• Server or Hub : The master
comp is called server, it facilitates
the sharing of data .
WHAT IS NETWORK INTERFACE UNIT (NIU) ?
• It is a device attached to each workstation and server.
• Helps to make connections within the network.
• Each NIU has a unique no identifying it called node address.
• NIU is also called terminal access point (TAP).
• Also called Network Interface Card (NIC).
• Each NIC is given a unique physical address called MAC
address.
HOW DATA IS TRANSMITTED ACROSS NETWORKS ?
Switching Techniques are used for transmitting data across networks.
3 types of switching techniques are there.
• Circuit Switching ,
• Message Switching ,
• Packet Switching .
TYPES OF NETWORKS
• Local Area Network - LAN
• Metropolitan Area Network – MAN
• Wide Area Network – WAN
• Personal Area Network - PAN
• Campus Area Network - CAN
TOPOLOGIES
The pattern of interconnection of nodes in a network is called the topology.
Types of TOPOLOGIES :-
•Bus Topology,
•Star Topology,
•Ring Topology,
•Tree Topology,
•Mesh Topology.
NETWORK DEVICE
•Modem ,
•RJ 45 Connector,
•Ethernet Card,
•Hub,
•Switch,
•Repeater,
•Bridge,
•Router.
TYPES OF NETWORK
Two classifications are
• Peer-to-Peer network :- * Nodes provide and request services *
User in each node administers resources * No extra investment *
Easy to setup * Very weak security * Additional load on nodes .
• Server based network :- * Designated computer to administer *
Resources centralized * Supports larger networks * Strong security *
Expensive .
OSI MODEL
OSI Reference Model
• Open Systems Interconnection
• No one really uses this in the real world.
• A reference model so others can develop
detailed interfaces .
• Value: The reference model defines 7 layers of
functions that take place at each end of
communication and with each layer adding its
own set of special related functions .
• Flow of data through each layer at one time.
NETWORK PROTOCOLS
• Protocol are used for communication between computers in different computer
networks. Protocol achieves : * What is communicated between computers? * How
it is communicated? * When it is communicated? * What conformance (bit
sequence) between computers?
• Key elements of a protocol are:
* SYNTAC: Data format and signal levels ,
* SEMANTICS: Control information for coordination and error handling , * TIMING:
Synchronization, speed matching, and sequencing .
• Examples of protocols: * WAN Protocol: TCP/IP .
THANK YOU

More Related Content

What's hot

Cluster computing pptl (2)
Cluster computing pptl (2)Cluster computing pptl (2)
Cluster computing pptl (2)
Rohit Jain
 
Cloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling TechnologiesCloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling Technologies
Abdelkhalik Mosa
 
Fog Computing: What, How and Why [Shakeeb A.]
Fog Computing: What, How and Why [Shakeeb A.]Fog Computing: What, How and Why [Shakeeb A.]
Fog Computing: What, How and Why [Shakeeb A.]
Shakeeb Ahmad Mohammad Mukhtar
 
Network Virtualization
Network Virtualization Network Virtualization
Network Virtualization
InterVision Systems
 
How Cloud Computing Works
How Cloud Computing WorksHow Cloud Computing Works
How Cloud Computing Works
Jason Robinson
 
Peer to peer(p2 p)
Peer to peer(p2 p)Peer to peer(p2 p)
Peer to peer(p2 p)
Mukesh Pilaniya
 
Cloud Computing Architecures
Cloud Computing ArchitecuresCloud Computing Architecures
Cloud Computing Architecures
Anne Starr
 
Networking by Mujahid Hussain
Networking by Mujahid HussainNetworking by Mujahid Hussain
Networking by Mujahid Hussain
Mujahid Hussain Jalbani
 
Basics of cloud
Basics of cloudBasics of cloud
Basics of cloud
Syborg Services
 
Application Delivery Platform Towards Edge Computing - Bukhary Ikhwan
Application Delivery Platform Towards Edge Computing - Bukhary IkhwanApplication Delivery Platform Towards Edge Computing - Bukhary Ikhwan
Application Delivery Platform Towards Edge Computing - Bukhary Ikhwan
OpenNebula Project
 
MidoNet Future -ミドネットの未来-
MidoNet Future -ミドネットの未来-MidoNet Future -ミドネットの未来-
MidoNet Future -ミドネットの未来-
Midokura
 
Seminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaSeminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant Gupta
Prashant Gupta
 
Evolution of Network Virtualization
Evolution of Network VirtualizationEvolution of Network Virtualization
Evolution of Network Virtualization
Pavan Hasabnis
 
Harshit.ppt
Harshit.pptHarshit.ppt
Harshit.ppt
harshit asthana
 
Network Virtualization
Network VirtualizationNetwork Virtualization
Network Virtualization
Kingston Smiler
 
SECURITY, VIRTUALISATION AND INTEGRITY IN CLOUD COMPUTING
SECURITY, VIRTUALISATION AND INTEGRITY IN CLOUD COMPUTINGSECURITY, VIRTUALISATION AND INTEGRITY IN CLOUD COMPUTING
SECURITY, VIRTUALISATION AND INTEGRITY IN CLOUD COMPUTING
Tannishtha Sengupta
 
Hybrid Virtual Machine-based SDN System in Cloud
Hybrid Virtual Machine-based SDN System in CloudHybrid Virtual Machine-based SDN System in Cloud
Hybrid Virtual Machine-based SDN System in Cloud
Nam Yong Kim
 
Simulation of network through virtualization technique
Simulation of network through virtualization techniqueSimulation of network through virtualization technique
Simulation of network through virtualization technique
monalissadeivasigamani
 
Networking course khurram shahzad
Networking course khurram shahzadNetworking course khurram shahzad
Networking course khurram shahzad
khurrak_shahzad
 
Network Virtualization Architectural & Technological aspects
Network Virtualization Architectural & Technological aspectsNetwork Virtualization Architectural & Technological aspects
Network Virtualization Architectural & Technological aspects
deshpandeamrut
 

What's hot (20)

Cluster computing pptl (2)
Cluster computing pptl (2)Cluster computing pptl (2)
Cluster computing pptl (2)
 
Cloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling TechnologiesCloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling Technologies
 
Fog Computing: What, How and Why [Shakeeb A.]
Fog Computing: What, How and Why [Shakeeb A.]Fog Computing: What, How and Why [Shakeeb A.]
Fog Computing: What, How and Why [Shakeeb A.]
 
Network Virtualization
Network Virtualization Network Virtualization
Network Virtualization
 
How Cloud Computing Works
How Cloud Computing WorksHow Cloud Computing Works
How Cloud Computing Works
 
Peer to peer(p2 p)
Peer to peer(p2 p)Peer to peer(p2 p)
Peer to peer(p2 p)
 
Cloud Computing Architecures
Cloud Computing ArchitecuresCloud Computing Architecures
Cloud Computing Architecures
 
Networking by Mujahid Hussain
Networking by Mujahid HussainNetworking by Mujahid Hussain
Networking by Mujahid Hussain
 
Basics of cloud
Basics of cloudBasics of cloud
Basics of cloud
 
Application Delivery Platform Towards Edge Computing - Bukhary Ikhwan
Application Delivery Platform Towards Edge Computing - Bukhary IkhwanApplication Delivery Platform Towards Edge Computing - Bukhary Ikhwan
Application Delivery Platform Towards Edge Computing - Bukhary Ikhwan
 
MidoNet Future -ミドネットの未来-
MidoNet Future -ミドネットの未来-MidoNet Future -ミドネットの未来-
MidoNet Future -ミドネットの未来-
 
Seminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaSeminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant Gupta
 
Evolution of Network Virtualization
Evolution of Network VirtualizationEvolution of Network Virtualization
Evolution of Network Virtualization
 
Harshit.ppt
Harshit.pptHarshit.ppt
Harshit.ppt
 
Network Virtualization
Network VirtualizationNetwork Virtualization
Network Virtualization
 
SECURITY, VIRTUALISATION AND INTEGRITY IN CLOUD COMPUTING
SECURITY, VIRTUALISATION AND INTEGRITY IN CLOUD COMPUTINGSECURITY, VIRTUALISATION AND INTEGRITY IN CLOUD COMPUTING
SECURITY, VIRTUALISATION AND INTEGRITY IN CLOUD COMPUTING
 
Hybrid Virtual Machine-based SDN System in Cloud
Hybrid Virtual Machine-based SDN System in CloudHybrid Virtual Machine-based SDN System in Cloud
Hybrid Virtual Machine-based SDN System in Cloud
 
Simulation of network through virtualization technique
Simulation of network through virtualization techniqueSimulation of network through virtualization technique
Simulation of network through virtualization technique
 
Networking course khurram shahzad
Networking course khurram shahzadNetworking course khurram shahzad
Networking course khurram shahzad
 
Network Virtualization Architectural & Technological aspects
Network Virtualization Architectural & Technological aspectsNetwork Virtualization Architectural & Technological aspects
Network Virtualization Architectural & Technological aspects
 

Similar to Network Presentation

Computer Networking.pptx
Computer Networking.pptxComputer Networking.pptx
Computer Networking.pptx
Ankita Shirke
 
Networking basics
Networking basicsNetworking basics
Networking basics
Vadiraj Jahagirdar
 
NETWORKING PPT
NETWORKING PPTNETWORKING PPT
NETWORKING PPT
VAIBHAV TANWAR
 
CNE CHP1.pdf
CNE CHP1.pdfCNE CHP1.pdf
CNE CHP1.pdf
Nehaam3
 
KRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptxKRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptx
ADITYAKUMAR554673
 
Computer networkppt-110208141655-phpapp02
Computer networkppt-110208141655-phpapp02Computer networkppt-110208141655-phpapp02
Computer networkppt-110208141655-phpapp02
DeShawn A. Larkin
 
computer-network.pptx
computer-network.pptxcomputer-network.pptx
computer-network.pptx
BrindhaSenthilKumar3
 
info technology.pptx
info technology.pptxinfo technology.pptx
info technology.pptx
ssuser07362a
 
Web applications and security. By: Partha Jee Chauhan, MSc Computer Science
Web applications and security. By: Partha Jee Chauhan, MSc Computer ScienceWeb applications and security. By: Partha Jee Chauhan, MSc Computer Science
Web applications and security. By: Partha Jee Chauhan, MSc Computer Science
Partha Jee Chauhan
 
1 - Understending Local Area network (1).pptx
1 - Understending Local Area network (1).pptx1 - Understending Local Area network (1).pptx
1 - Understending Local Area network (1).pptx
NaserDelic1
 
B5_WEEK 1_COMPUTER NETWORK.pptx
B5_WEEK 1_COMPUTER NETWORK.pptxB5_WEEK 1_COMPUTER NETWORK.pptx
B5_WEEK 1_COMPUTER NETWORK.pptx
EmmanuelNYAMENAAYE
 
COMPUTER APPLICATIONS Module 3.pptx
COMPUTER APPLICATIONS Module 3.pptxCOMPUTER APPLICATIONS Module 3.pptx
COMPUTER APPLICATIONS Module 3.pptx
Arti Parab Academics
 
Module 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptxModule 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptx
AASTHAJAJOO
 
Basic networking
Basic networkingBasic networking
Computer network and its topologies
Computer network and its topologiesComputer network and its topologies
Computer network and its topologies
Ayush0734
 
Computer network
Computer networkComputer network
Computer network
ASHIK MAHMUD
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer network
Atika Zaimi
 
Computer networks
Computer networksComputer networks
Computer networks
INOCENTBAJWA
 
computer networking and its application ppt
computer networking and its application pptcomputer networking and its application ppt
computer networking and its application ppt
Nitesh Dubey
 
Lecture 1 Computer Networks.pptxsecond course
Lecture 1 Computer Networks.pptxsecond courseLecture 1 Computer Networks.pptxsecond course
Lecture 1 Computer Networks.pptxsecond course
LamiyQurbanlKomptert
 

Similar to Network Presentation (20)

Computer Networking.pptx
Computer Networking.pptxComputer Networking.pptx
Computer Networking.pptx
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
NETWORKING PPT
NETWORKING PPTNETWORKING PPT
NETWORKING PPT
 
CNE CHP1.pdf
CNE CHP1.pdfCNE CHP1.pdf
CNE CHP1.pdf
 
KRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptxKRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptx
 
Computer networkppt-110208141655-phpapp02
Computer networkppt-110208141655-phpapp02Computer networkppt-110208141655-phpapp02
Computer networkppt-110208141655-phpapp02
 
computer-network.pptx
computer-network.pptxcomputer-network.pptx
computer-network.pptx
 
info technology.pptx
info technology.pptxinfo technology.pptx
info technology.pptx
 
Web applications and security. By: Partha Jee Chauhan, MSc Computer Science
Web applications and security. By: Partha Jee Chauhan, MSc Computer ScienceWeb applications and security. By: Partha Jee Chauhan, MSc Computer Science
Web applications and security. By: Partha Jee Chauhan, MSc Computer Science
 
1 - Understending Local Area network (1).pptx
1 - Understending Local Area network (1).pptx1 - Understending Local Area network (1).pptx
1 - Understending Local Area network (1).pptx
 
B5_WEEK 1_COMPUTER NETWORK.pptx
B5_WEEK 1_COMPUTER NETWORK.pptxB5_WEEK 1_COMPUTER NETWORK.pptx
B5_WEEK 1_COMPUTER NETWORK.pptx
 
COMPUTER APPLICATIONS Module 3.pptx
COMPUTER APPLICATIONS Module 3.pptxCOMPUTER APPLICATIONS Module 3.pptx
COMPUTER APPLICATIONS Module 3.pptx
 
Module 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptxModule 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptx
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Computer network and its topologies
Computer network and its topologiesComputer network and its topologies
Computer network and its topologies
 
Computer network
Computer networkComputer network
Computer network
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer network
 
Computer networks
Computer networksComputer networks
Computer networks
 
computer networking and its application ppt
computer networking and its application pptcomputer networking and its application ppt
computer networking and its application ppt
 
Lecture 1 Computer Networks.pptxsecond course
Lecture 1 Computer Networks.pptxsecond courseLecture 1 Computer Networks.pptxsecond course
Lecture 1 Computer Networks.pptxsecond course
 

Recently uploaded

Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
Fwdays
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 

Recently uploaded (20)

Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 

Network Presentation

  • 2. WHAT IS A NETWORK ? • Network, in computer science, a group of computers and associated devices that are connected by communications facilities. • Network is an inter connected collection of autonomous computers. • When two or more computers are joined together so that they are capable of exchanging information , they form a network.
  • 3. NEED OF NETWORKING ? • Resource sharing - Through a network , data , s/w and h/w resources can be shared irrespective of the physical location of the resources and the user. • Reliability – A file can have its copies on two or more computers of the network. • Reduced Cost – Sharing resources reduces the cost • Fast Communication – Information can be exchanged at a very fast speed.
  • 4. WHAT IS INTERNET ? Internet is worldwide network of computer networks. How does it work ? • Most computers are not connected directly to the internet . • They are connected to smaller networks . • Which are connected through gateways to the internet backbone .
  • 5. WHAT IS A GATEWAY ? • Gateway is a device that connects dissimilar networks. • A backbone is a central interconnecting structure that connects one or more networks just like the trunk of a tree.
  • 6. FEW THINGS RELATED TO NETWORK • Workstation or Nodes : refers to a computer that are attached to a network . • Server or Hub : The master comp is called server, it facilitates the sharing of data .
  • 7. WHAT IS NETWORK INTERFACE UNIT (NIU) ? • It is a device attached to each workstation and server. • Helps to make connections within the network. • Each NIU has a unique no identifying it called node address. • NIU is also called terminal access point (TAP). • Also called Network Interface Card (NIC). • Each NIC is given a unique physical address called MAC address.
  • 8. HOW DATA IS TRANSMITTED ACROSS NETWORKS ? Switching Techniques are used for transmitting data across networks. 3 types of switching techniques are there. • Circuit Switching , • Message Switching , • Packet Switching .
  • 9. TYPES OF NETWORKS • Local Area Network - LAN • Metropolitan Area Network – MAN • Wide Area Network – WAN • Personal Area Network - PAN • Campus Area Network - CAN
  • 10. TOPOLOGIES The pattern of interconnection of nodes in a network is called the topology. Types of TOPOLOGIES :- •Bus Topology, •Star Topology, •Ring Topology, •Tree Topology, •Mesh Topology.
  • 11. NETWORK DEVICE •Modem , •RJ 45 Connector, •Ethernet Card, •Hub, •Switch, •Repeater, •Bridge, •Router.
  • 12. TYPES OF NETWORK Two classifications are • Peer-to-Peer network :- * Nodes provide and request services * User in each node administers resources * No extra investment * Easy to setup * Very weak security * Additional load on nodes . • Server based network :- * Designated computer to administer * Resources centralized * Supports larger networks * Strong security * Expensive .
  • 13. OSI MODEL OSI Reference Model • Open Systems Interconnection • No one really uses this in the real world. • A reference model so others can develop detailed interfaces . • Value: The reference model defines 7 layers of functions that take place at each end of communication and with each layer adding its own set of special related functions . • Flow of data through each layer at one time.
  • 14. NETWORK PROTOCOLS • Protocol are used for communication between computers in different computer networks. Protocol achieves : * What is communicated between computers? * How it is communicated? * When it is communicated? * What conformance (bit sequence) between computers? • Key elements of a protocol are: * SYNTAC: Data format and signal levels , * SEMANTICS: Control information for coordination and error handling , * TIMING: Synchronization, speed matching, and sequencing . • Examples of protocols: * WAN Protocol: TCP/IP .