This document provides an overview of computer networking concepts. It defines a network as connecting two or more computers to share resources. Networks allow simultaneous access to data, data sharing, personal communication, hardware sharing, and easier data backup. The main types of networks are LAN, MAN, and WAN. Network operating systems like peer-to-peer and client/server control software and hardware. Common network topologies include bus, star, tree, ring, and mesh. Wired and wireless media transmit data. Networking devices include network interface cards, repeaters, hubs, bridges, switches, and routers.
Classification of Networks
Major Types of Networks
Topologies of Network for Local Area Networks
P2P Networks
Client to Server Network
Mesh topology
star topology
bus topology
Classification of Networks
Major Types of Networks
Topologies of Network for Local Area Networks
P2P Networks
Client to Server Network
Mesh topology
star topology
bus topology
#network #types of network
COMPUTER NETWORKING FUNDAMENTALS
SLIDE PPT CONSIST OF
definition,its components,advantages,Disadvantages,switching techniques,network architectures, and Types of Networks.
If you are interested in computer networking and more topics related to computers.
Must watch my youtube channel TECHISEASY
,
ddata communications and computer networks
,
basic elements of a communication system
,
coaxial cable
,
star network
,
data transmission media
,
ring network
,
hybrid network
,
completely connected network
,
multi-access bus network
,
network linking devices
,
network interface card (nic)
Computer Network notes (handwritten) UNIT 1NANDINI SHARMA
Introduction of computer network, layered architecture, topology, guided and unguided media, signals, multiplexing, OSI vs TCP/IP , IP address, TCP , UDP, DHCP, DNS, HTTP, etc.
#network #types of network
COMPUTER NETWORKING FUNDAMENTALS
SLIDE PPT CONSIST OF
definition,its components,advantages,Disadvantages,switching techniques,network architectures, and Types of Networks.
If you are interested in computer networking and more topics related to computers.
Must watch my youtube channel TECHISEASY
,
ddata communications and computer networks
,
basic elements of a communication system
,
coaxial cable
,
star network
,
data transmission media
,
ring network
,
hybrid network
,
completely connected network
,
multi-access bus network
,
network linking devices
,
network interface card (nic)
Computer Network notes (handwritten) UNIT 1NANDINI SHARMA
Introduction of computer network, layered architecture, topology, guided and unguided media, signals, multiplexing, OSI vs TCP/IP , IP address, TCP , UDP, DHCP, DNS, HTTP, etc.
Chronic exposure to inorganic arsenic (iAs) in the human population is associated with various internal cancers and other adverse outcomes. The purpose of this study was to estimate a population-scale exposure risk attributable to iAs consumptions by linking a stochastic physiological based pharmacokinetic (PBPK) model and biomonitoring data of iAs in urine. The urinary As concentrations were obtained from a total of 1,043 subjects living in an industrial area of Taiwan. The results showed that study subjects had an iAs exposure risk of 27% (daily iAs intake for 27% study subjects exceeded the WHO recommended value, 2.1 μg iAs day-1 kg-1 body wt). Moreover, drinking water and cooked rice contributed to the iAs exposure risk of 10% and 41%, respectively. The predicted risks in the current study were 4.82%, 27.21%, 34.69%, and 64.17%, respectively, among the mid-range of Mexico, Taiwan (this study), Korea and Bangladesh reported in literature. In conclusion, we developed a population-scale based risk model that covered the broad range of iAS exposure by integrating stochastic PBPK modeling and reverse dosimetry that generates probabilistic distribution of As intake corresponding to urinary As measured from the cohort study. The model can also be updated as new urinary As information becomes available.
Sørg alltid for å få nok søvn før du starter på en lang kjøretur.Vær sikker på at bilen er i førsteklasses stand, at dekkene har nok luft og at bensintanken er full. Også i tåke blir sikten dårligere, og da bør du unngå forbikjøringer.
URL:http://www.nokiantyres.no/innovativt-arbeide/sikkerhet/billige-dekk/
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
2. Network
Group of two or more computers interconnected to share
resources, exchange data or allow electronic communication is
called as a network.
The communication between two or more interconnected
devices is called networking.
An internetwork is a connection of two or more networks.
Internetworking means communication between different
networks.
3. The Uses of a Network
Simultaneous access to data
Data files are shared
Access can be limited
Shared files stored on a server
Software can be shared
5. The Uses of a Network
Personal communication
Email
Instantaneous communication
Conferencing
Tele conferencing
Videoconferencing
Audio-conferencing
Data-conferencing
Voice over IP
Phone communication over network wires
7. The Uses of a Network
Easier data backup
Backup copies data to removable media
Server data backed up in one step
8. The Uses of a Network
Hardware Sharing
Printers, scanners and devices can be shared.
9. Types of Networks
LAN
Local Area Networks are used to connect networking
devices that are in a very close geographic area such as a
floor of a building, a building itself or within a campus.
MAN
Metropolitan Area Network are used to connect
networking devices that may span around the entire city.
WAN
Wide Area Networks which connects two or more LANs
present at different geographical locations.
13. Network Operating System
A network operating system is a software application that
provides a platform for both the functionality of an
individual computer and for multiple computers within an
interconnected network.
A Network Operating System (NOS) is a software program
that controls other software and hardware running on a
network.
It also allows multiple computers, known as network
computers, to communicate with one central hub and each
other to share resources, run applications, and send
messages.
14. Types of NOS’s
There are two major types of network operating
systems:
Peer-to-Peer
Client/Server
15. Peer-to-Peer
In Peer-to-Peer NOS, all
computers share
equivalent responsibility
for processing data. They
have same abilities to use
the resources available on
the network.
They don’t have a
centralized management
source.
16. Advantages
It is easy to install and so is the configuration of computers on
this network.
All the resources and contents are shared by all the peers, unlike
server-client architecture where Server shares all the contents
and resources.
P2P is more reliable as central dependency is eliminated. Failure
of one peer doesn’t affect the functioning of other peers.
There is no need for full-time System Administrator. Every user
is the administrator of his machine. User can control their
shared resources.
The over-all cost of building and maintaining this type of
network is comparatively very less.
17. Disadvantages
In this network, the whole system is decentralized thus it is
difficult to administer.
Security in this system is very less. Viruses, spywares,
trojans, etc malwares can easily transmitted over this P-2-P
architecture.
Data recovery or backup is very difficult. Each computer
should have its own back-up system
18. Client/Server
In Client Server NOS there is
one powerful computer
(known as server) which acts
as a provider of information
to other sub-ordinate
workstations (called client).
Server becomes the heart of
the system, providing access
to resources and providing
security.
19. Advantages
There is a centralized control. Servers help in
administering the whole set-up. Access rights and resource
allocation is done by Servers.
All the files are stored at the same place. In this way,
management of files becomes easy. Also it becomes easier
to find files.
As all the data is stored on server its easy to make a back-up
of it. Also, in case of some break-down if data is lost, it can
be recovered easily and efficiently.
Rules defining security and access rights can be defined at
the time of set-up of server.
20. Disadvanatges
Too many requests from the clients may lead to congestion,
which rarely takes place in P2P network. Overload can lead
to breaking-down of servers.
If the server fails, the whole network goes down.
It is very expensive to install and manage this type of
computing.
21. Topology
Topology is a physical layout of the systems connected in a
network.
Different types of topology are:
Bus
Star
Tree
Choice affects
Network performance
Network size
Network collision detection
22. Linear Bus Topology
In bus topology all devices are connected to a single cable
or backbone.
It supports half duplex communication.
23. Advantages
Easy to setup.
Requires less cable length.
Disadvantages
A break at any point along the backbone will result in total
network failure.
24. Star Topology
The most commonly used topology
It consist of one centralized device which can be either a
switch or a hub.
The devices connect to the various ports on the centralized
devices.
HUB/Switch
25. Advantages
Easy to setup.
Easy to add/remove parts
Disadvantages
One hub crashing downs entire network.
Uses lots of cable
26. Tree Topology
A tree topology combines the characteristics of linear bus
and star topology.
It consist of groups of star configured workstations
connected to a linear bus backbone cable.
27. Advantages
Expansion of Network is possible and easy.
We divide the whole network into segments (star
networks), which can be easily managed and maintained.
Each segment is provided with dedicated point-to-point
wiring to the central hub.
If one segment is damaged, other segments are not
affected.
Disadvantages
Because of its basic structure, tree topology, relies heavily
on the main bus cable, if it breaks whole network is
crippled.
More difficult to configure.
28. Ring Topology
In ring topology each computer or device is connected to
its neighbor forming a loop.
29. Advantages
Each computer has equal access to resources.
There is no need for network server to control the
connectivity between workstations.
Disadvantages
Failure of a single device or a break anywhere in the cable
causes the full network to stop communicating.
Each packet of data must pass through all the computers
between source and destination. This makes it slower
than Star topology.
If one workstation or port goes down, the entire network
gets affected.
30. Mesh Topology
In mesh topology each device is directly connected to all other
devices.
In fact a true mesh topology is the one where every node is
connected to every other node in the network. This type of
topology is very expensive as there are many redundant
connections
31. Advantages
Data can be transmitted from different devices simultaneously.
This topology can withstand high traffic.
Even if one of the components fails there is always an alternative
present. So data transfer doesn’t get affected.
Expansion and modification in topology can be done without
disrupting other nodes.
Disadvantages
There are high chances of redundancy in many of the network
connections.
Overall cost of this network is way too high as compared to other
network topologies.
Set-up and maintenance of this topology is very difficult. Even
administration of the network is tough.
32. Network Media
Links that connect nodes.
Communication channel through which data travels
on a network.
Choice impacts
Speed
Security
Size
33. Wire Based Media (guided)
Twisted-pair cable
Most common LAN
cable
Four pairs of copper
cable twisted
May be shielded from
interference
Speeds range from
1 Mbps to 1,000 Mbps
34. Wire Based Media (guided)
Coaxial cable
Similar to cable TV wire
One wire runs through cable
Shielded from interference
Speeds up to 10 Mbps
35. Wire Based Media (guided)
Fiber-optic cable
Data is transmitted with
light pulses
Glass strand instead of
cable
Immune to interference
Very secure
Hard to work with
Speeds up to
100 Gbps
36. Wireless Media (unguided)
Data transmitted through the air
LANs use radio waves
WANs use microwave signals
Easy to setup
Difficult to secure
37. Networking Devices
Networking devices include all the equipment needed to
perform data-processing and communications within the
network.
Network Interface Card
Repeaters
Concentrator/Hubs
Bridges
Switches
Routers
38. Network Interface Card
A NIC, typically an expansion card in a computer, is used to
connect a system to physical network media.
Nowadays, computers are equipped with a built-in NIC.
NICs are available for different types of network media, the
most common today being Ethernet NICs with a RJ-45
Socket for twisted pair cabling and wireless network
adapters with antenna.
42. Repeater
Repeaters clean, amplify, and resend signals that are
weakened by long cable length.
Can be separate or built-in to hubs or switches
Most economic way of expanding a network.
The number of repeaters must be limited.
Repeaters cannot connect different network
architecture.
Repeater do not reduce network traffic.
Half –Duplex Communication.
43. Hub/Concentrators
Hubs regenerate and retime network signals.
They are really multi-port repeaters.
Hubs propagate signals through the network
They cannot filter network traffic
They cannot determine best path
Uplink port – crossover mode or straight through mode
46. Bridges
Bridges are more intelligent than hubs.
They increase network performance by segmenting
networks in separate collision domains.
They maintains a table with MAC Addresses of all attached
nodes and on which segment they are located.
Filter traffic by looking at the MAC address.
Used for connecting two different topology (Segment).
If the frame is addressed to a MAC address on the local side
of the bridge, it is not forwarded to the other segment
Bridges maintain a MAC address table for both segments
they are connected to
47. Switches
It is an Intelligent device.
It maintains MAC address table (hardware address).
Switches resemble bridges and can be considered as
multiport bridges.
Each port of the switch has fixed bandwidth.
Supports full duplex communication.
49. Functions of Switch MAC ADDRESS TABLE
PORT MAC-
ADDRESS
1
2
3
4
5
6
7
8
001C-C01A-0002
001C-C01A-0004
001C-C01A-0002
1
2
3
4 5 6
7
8
S
D
DataDataDataDataDataData
Data
Source MAC
001C.C01A.0002
Destination MAC
001C.C01A.0004
DATA
Source MAC
001C.C01A.0002
Destination MAC
001C.C01A.0004
DATA
50. MAC ADDRESS TABLE
PORT MAC-
ADDRESS
Fa0/1
Fa0/2 001C-C01A-
0002
Fa0/3
Fa0/4
Fa0/5
Fa0/6
Fa0/7
Fa0/8
001C-C01A-0004
001C-C01A-0002
001C-C01A-0004
1
2
3
4 5 6
7
8
D
S Data
52. Router
These are physical devices that join multiple wired and
wireless networks together.
Routers select the best path to route a message, based
on destination address and origin.
The router can direct traffic to prevent head-on
collisions.
Routers know the addresses of computers, bridges and
other routers on the network.
Routers usually uses the IP Addresses