Here is the short description about computer network components.
Explained here about networking components such as Hub, Switch, Repeater, Bridge and so on.
Here is the short description about computer network components.
Explained here about networking components such as Hub, Switch, Repeater, Bridge and so on.
Here, I explained about IP Addressing, Subnet Mask etc. And also explained IP convert into Binary technique. I tried to describe details about IP address.
The Open Systems Interconnection Basic Reference Model [OSI] is an abstract description for network protocol design, developer as an effort to standardize networking.
A computer network is network of computer .It connects multiple computer in manner to enable meaningful transmission and exchange of data among them.Main objective of CN is sharing of information ,resources and processing load among the connected computer.
you can easily get basic introduction of COMPUTER NETWORK
Here, I explained about IP Addressing, Subnet Mask etc. And also explained IP convert into Binary technique. I tried to describe details about IP address.
The Open Systems Interconnection Basic Reference Model [OSI] is an abstract description for network protocol design, developer as an effort to standardize networking.
A computer network is network of computer .It connects multiple computer in manner to enable meaningful transmission and exchange of data among them.Main objective of CN is sharing of information ,resources and processing load among the connected computer.
you can easily get basic introduction of COMPUTER NETWORK
Computer networks have become part of our everyday lives. We use them to take cash from the local ATM. Whenever we send email or browse the Web, we rely on the world’s largest computer network, the Internet, to be our electronic mailman. Telemarketers, usually during dinner hour, use computer networks to sell us their wares. Our cable television stations rely on computer networks to transport programs onto our TV screens. What is a compelling example of their presence in our lives? Without computer networks, our cellular phone is little more than a battery powering-up a meaningless screen. Read more.........
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
1. TYPES OF NETWORKS
LAN – LOCAL AREA NETWORK IS A SMALL
GEOGRAPHICAL AREA typically within the premises of
A building
MAN – METROPOLITAN AREA NETWORK IS A
NETWORK OVER A LARGER GEOGRAPHICAL AREA
SUCH AS a city.
WAN – WIDE AREA NETWORK IS A NETWORK USED
OVER AN EXTREMELY LARGE GEOGRAPHICAL AREA
SUCH AS the country or beyond the nation.
Basics of Networking
2. NETWORKS ARE BROKEN INTO 3 TOPOLOGIES.
THEY ARE:
BUS TOPOLOGY
STAR TOPOLOGY
RING TOPOLOGY
Basics of Networking
3. BUS TOPOLOGY ALLOWS INFORMATION TO BE
DIRECTED FROM ONE COMPUTER TO THE OTHER.
LOTS OF BINARY COLLISION THOUGH.
Basics of Networking
4. Lesson 3—
Networking
BASICS 4
Bus Topology
It is a multipoint topology.
Each device shares the connection.
The bus has one starting and one
ending point.
Packets stop at each device on the
network.
Only one device at a time can
send.
5. STAR TOPOLOGY IS THE MOST COMMON TYPE
USED. ALL COMPUTERS ARE ATTACHED TO A HUB.
LESS COLLISIONS AND MOST EFFICIENT.
Basics of Networking
6. Lesson 3—
Networking
BASICS 6
Star Topology
• All devices are connected to a
central device (hub).
• The hub receives and forwards
packets.
• It is the easiest topology to
troubleshoot and manage.
• It has a single point of failure.
8. RING TOPOLOGY- USES A TOKEN TO PASS
INFORMATION FROM 1 COMPUTER TO THE OTHER.
A TOKEN IS ATTACHED TO THE MESSAGE BY THE
SENDER TO IDENTIFY WHICH COMPUTER SHOULD
RECEIVE THE MESSAGE. AS THE MESSAGE MOVES
AROUND THE RING, EACH COMPUTER EXAMINES
THE TOKEN. IF THE COMPUTER IDENTIFIES THE TOKEN
AS ITS OWN, THEN IT WILL PROCESS THE
INFORMATION.
Basics of Networking
9. Lesson 3—
Networking
BASICS 9
Ring Topology
• It is a circle with no ends.
• Packets are sent from one
device to the next.
• It does not slow down as
more devices are added.
10. A DISADVANTAGE OF A TOKEN RING IS IF ONE
COMPUTER IS BROKEN OR DOWN, THE MESSAGE
CANNOT BE PASSED TO THE OTHER COMPUTERS.
Basics of Networking
13. Lesson 3—
Networking
BASICS 13
Hybrid Topologies
• They are variations of two or more
topologies.
• Star bus – used to connect multiple
hubs in a star topology with a bus.
• Star ring – wired like star, but
functions like a ring.
14. Lesson 3—
Networking
BASICS 14
Common basic networking devices:
Router: a specialized network device that determines the next
network point to which it can forward a data packet towards the
destination of the packet. Unlike a gateway, it cannot interface
different protocols. Works on OSI layer 3.
Switch: a device that allocates traffic from one network segment to
certain lines (intended destination(s)) which connect the segment
to another network segment. So unlike a hub a switch splits the
network traffic and sends it to different destinations rather than to
all systems on the network. Works on OSI layer 2.
15. Lesson 3—
Networking
BASICS 15
Proxy: computer : network service which allows clients to make
indirect network connections to other network services
Firewall: a piece of hardware or software put on the network to
prevent some communications forbidden by the network policy
Network Address Translator: network service provide as hardware
or software that converts internal to external network addresses
and vice versa
# Network Card: a piece of computer hardware to allow the attached
computer to communicate by network
# Modem: device that modulates an analog "carrier" signal (such as
sound), to encode digital information, and that also demodulates such a
carrier signal to decode the transmitted information, as a computer
communicating with another computer over the telephone network
16. Lesson 3—
Networking
BASICS 16
Routers within the network recognize that the request is not for a
resource inside the network, so they send the request to the
firewall. The firewall sees the request from the computer with the
internal IP. It then makes the same request to the Internet using its
own public address, and returns the response from the Internet
resource to the computer inside the private network. From the
perspective of the resource on the Internet, it is sending
information to the address of the firewall. From the perspective of
the workstation, it appears that communication is directly with the
site on the Internet. When NAT is used in this way, all users inside
the private network access the Internet have the same public IP
address when they use the Internet. That means only one public
addresses is needed for hundreds or even thousands of users.
17. The seven layers of the OSI Model are:
Layer 1 PHYSICAL
Layer 2 DATA-LINK
Layer 3 NETWORK
Layer 4 TRANSPORT
Layer 5 SESSION
Layer 6 PRESENTATION
Basics of Networking
18. THE PHYSICAL LAYER
The physical layer is concerned with transmitting
raw bits over a communication channel though
hubs, wires (cat5UTP), modems, network cards…
basically anything that is physical to the network.
When looking at network cables, there are
2 types that affect nodes. They are:
In networking, computers are also known as
Hosts or Nodes.
Basics of Networking
19. •Straight though cables or also known as patch cables
•Cross-over cables
The difference in the cables are the way the wires
are connected within the RJ45. I have attached a
sheet for you in your package.
Basics of Networking
20. Lesson 3—
Networking
BASICS 20
Hub: connects multiple Ethernet segments together making them
act as a single segment. When using a hub, every attached all
the objects, compared to switches, which provide a dedicated
connection between individual nodes. Works on OSI layer 1.
Repeater: device to amplify or regenerate digital signals received
while sending them from one part of a network into another.
Works on OSI layer 1.
21. TWISTED SHIELDED PAIR – USED IN PHONE LINES, NETWORKS
UNSHIELDED TWISTED PAIR “ “ “ “
COAXIAL CABLE – USED IN CABLEVISION GREAT FOR VIDEO
FIBRE OPTIC CABLES - USES LIGHT TO CARRY SIGNAL BUT
HARD TO WORK WITH AND LOOSES SIGNAL OVER LONGER
DISTANCES
COMMUNICATION CHANNELS
Basics of Networking
22. THE DATA-LINK LAYER
The data link layer takes raw transmission and
transform it into a line that appears free of
transmission errors in the network layer.
The Data-Link Layer also is where you would find
the MAC Address. (Media Access Control). To find the
MAC Address of your computer, or any computer:
Start/Programs/MS Prompt and type: ipconfig/all
Basics of Networking
"C:WINDOWS>" prompt, type "tracert
www.howstuffworks.com"
23. THE DATA-LINK LAYER
You will also find smart devices such as switches in
the Data-Link Layer.
The digital information that needs to be sent such as
and e-mail, attachments, etc needs to be broken into
smaller bits known as packets.
These packets require some information similar to
sending a letter in the mail.
Basics of Networking
24. THE NETWORK LAYER
The network layer is concerned with controlling
the operation of the subnet. A ROUTER is used to
determining how packets are routed from source
to destination.
If one path is busy, then the router will select another
path for the packets to travel. So really, the packets
can all have different paths and find their way to the
final destination.
Basics of Networking
25. THE NETWORK LAYER
The router has millions of IP addressing built into
the software, and knows where to send the packets.
IP stands for Internet Protocol and is basically an
address that the packets will be sent to.
An example would be 216.27.61.137
Basics of Networking
26. THE NETWORK LAYER
If you look at the IPAddress, the number are broken
into different categories.
216. 27.61.137
Classification Hosts
216. 27.61.137
Octets
Basics of Networking
27. Classifications can be broken into 3 classes. They are:
Class A - Only the first octet is used for addressing and
the balance used for hosts.
Class B - The first two octet are used for addressing
and the balance used for hosts.
Class C - The first three octet are used for addressing
and the balance used for hosts.
Basics of Networking
28. Every machine on the Internet has a unique
identifying number, called an IP Address.
A typical IP address looks like this:
216.27.61.137
But computers communicate in binary form.
Basics of Networking
29. The same IP address in binary:
11011000.00011011.00111101.10001001
216.27.61.137
Basics of Networking
30. If you add all the positions together, you get 32,
which is why IP addresses are considered
32-bit numbers
Combine the four octets and you get 232 or a possible
4,294,967,296 unique values.
11011000.00011011.00111101.10001001
Basics of Networking
31.
32. Class A - This class is for very large networks,
such as a major international company might have.
IP addresses with a first octet from 1 to 126 are
part of this class.
Basics of Networking
33. Class B - This class is used for medium-sized networks.
A good example is a large college campus.
IP addresses with a first octet from 128 to 191
are part of this class. Class B addresses also include
the second octet as part of the Net identifier.
Basics of Networking
34. Class C - Class C addresses are commonly used for
small to mid-size businesses. IP addresses
with a first octet from 192 to 223 are part of this
class. Class C addresses also include the second
and third octets as part of the Net identifier.
Basics of Networking
35. Loopback - The IP address 127.0.0.1 is used
as the loopback address. This means that it is
used by the host computer to send a message
back to itself.
Basics of Networking
LOOPBACK
36. MAC addresses are 48 bits in length and are expressed as 12
hexadecimal digits. The first 6 hexadecimal digits, which are
administered by the IEEE, identify the manufacturer or vendor
and thus comprise the Organizationally Unique Identifier (OUI).
The last 6 hexadecimal digits comprise the interface serial
number, or another value administered by the specific vendor.
MAC addresses sometimes are called burned-in addresses
(BIAs) because they are burned into read-only memory (ROM)
and are copied into random-access memory (RAM) when the
interface card initializes.
37. THE TRANSPORT LAYER
The transport layer “DIRECTS PACKETS”, splits it up into
smaller units if need be, pass these to the network
and ensure that the pieces are travelling in an
orderly fashion.
A series of protocols are also established in this
layer to ensure proper flow of the packets.
You can basically describe the Transport Layer as
a “TRAFFIC COP”.
Basics of Networking
38. THE SESSION LAYER
The session layer allows different machines to
establish sessions between themselves.
Once communications are established, encryption
then begins both parties.
Basics of Networking
39. THE PRESENTATION LAYER
The Presentation Layer’s job is managing data
structures and converting from the representation
used inside the computer to the network standard
representation an visa versa.
In English terms, the Presentation layer basically
takes the packets and re-assembles them so you can
open the e-mail or the attachment.
If any packets got lost along the way, or were
damaged, then the Presentation layer will send a
sign to the sender that it requires the specific packet.
Basics of Networking
40. THE APPLICATION LAYER
The Application layer contains a variety of protocols
that are commonly required.
Another Application layer function is file transfer.
Different file systems have different file naming
conventions, different ways of representing text lines,
and so on.
Transferring a file between two different systems
requires handling and other incompatibilities.
Basics of Networking
41. FTP - File Transfer Protocol
HTTP Protocol
Electronic Mail Protocols
THE APPLICATION LAYER
Basics of Networking
42. SOAP - Sim ple Object Access
Prot ocol
DHCP
The Dynam ic Host Configuration Protocol
THE APPLICATION LAYER
Basics of Networking
43. IPv6 - Int ernet Prot ocol version
IPv6 prom ises to relieve the current IP a
PPPoE
The Point to Point Protocol over Ethernet
(PPPoE) standard helps access providers
THE APPLICATION LAYER
Basics of Networking
44. The Internet is a global system of interconnecting computer
networks that use the standard Internet Protocol Suite (TCP/IP)
to serve billions of users worldwide. It is a network of networks
that consists of millions of private, public, academic, business,
and government networks, of local to global scope, that are
linked by a broad array of electronic, wireless and optical
networking technologies. The Internet carries a vast range of
information resources and services, and multimedia content such
as the inter-linked hypertext documents of the World Wide Web
(WWW) and the infrastructure to support electronic mail.
Most traditional communications media including telephone,
music, film, and television are reshaped or redefined by the
Internet, giving birth to new services such as Voice over Internet
Protocol (VoIP) and IPTV.
45. DOMAIN NAME :
Domain names are hostnames that identify
Internet Protocol (IP) resources such as web
sites. Domain names are formed by the rules
and procedures of the Domain Name System
(DNS).
Domain names are used in various networking
contexts and application-specific naming and
addressing purposes. They are organized in
subordinate levels (subdomains) of the DNS
root domain, which is nameless.
46.
47. The domain name space consists of a tree of domain names.
Each node in the tree holds information associated with the
domain name. The tree sub-divides into zones beginning at the
root zone.
A domain name consists of one or more parts, technically called
labels, that are conventionally concatenated, and delimited by
dots, such as example.com.
The right-most label conveys the top-level domain; for example,
the domain name www.example.com belongs to the top-level
domain com.
Domain name space
48. The hierarchy of domains descends from the right to the left
label in the name; each label to the left specifies a subdivision,
or subdomain of the domain to the right. For example: the label
example specifies a node example.com as a subdomain of the
com domain, and www is a label to create www.example.com, a
subdomain of example.com. This tree of labels may consist of
127 levels. Each label may contain 1 up to and including 63
octets
A hostname is a domain name that has at least one associated
IP address. For example, the domain names www.example.com
and example.com are also hostnames, whereas the com
domain is not. However, other top-level domains, particularly
country code top-level domains, may indeed have an IP
address, and if so, they are also hostnames.
49.
50. In this example, the client is performing a name resolution for
“C.B.A.” using strictly iterative resolution. It is thus responsible
for forming all DNS requests and processing all replies. It starts
by sending a request to the root name server for this mythical
hierarchy. That server doesn’t have the address of “C.B.A.”, so it
instead
returns the address of the name server for “A.”. The client then
sends its query to that name server, which
points the client to the server for “B.A.”. That name server refers
the client to the name server that actually has the address for
“C.B.A.”, which returns it to the client. Contrast to Figure 244.
51.
52. This is the same theoretical DNS resolution that I showed in
Figure 243, but this time, the client asks for the name servers to
perform recursive resolution and they agree to do so. As in the
iterative case, the client sends. Its initial request to the root name
server. That server doesn’t have the address of “C.B.A.”, but
instead of merely returning to the client the address of the name
server for “A.”, it sends a request to that server itself. That
name server sends a request to the server for “B.A.”, which in
turn sends a request to the server for “C.B.A.”. The address of
“C.B.A.” is then carried back up the chain of requests, from the
server of “C.B.A.” to that of “B.A.”, then “A.”, then the root, and
then finally, back to the client.