SlideShare a Scribd company logo
Computer
Networks
COMPUTER NETWORK ,
NETWORK MODELS AND
TOPOLOGIES
COMPUTER NETWORK
 Computer network connects
computers in a manner to
enable meaningful transmission
and exchange of data between
them.
 In computer network we can
share information, share
resources (hardware, software).
 Computer network is also called
Information network.
For Example: Internet
HISTORY OF COMPUTER NETWORK
 The first-ever Computer-to-Computer link was
established on ARPANET (Advance Research
Project Agency Network) , the precursor to
the Internet, on October 29, 1969.
 The message on the ARPANET was sent by
UCLA student programmer Charles S Kline.
NETWORK TOPOLOGIES
 A Network
Topology refers
to the way in
which nodes
are connected
in network.
BUS TOPOLOGY
 In Bus Topology, all
nodes are connected to
a single communication
line.

Advantages
 Reduce number of
physical line.
 Failure of node does
not effect the network
 .
Disadvantages
 Communication line
fails, the whole network
fails.
STAR TOPOLOGY
 In a star topology all computers
or nodes are directly connected
to a central device called hub
or switch.
Advantages
 New nodes can easily added
and removed to and from the
central device.
 If any node fails, other nodes
are not affected
 .
Disadvantages
 If the central device fails the
whole network fails.
RING TOPOLOGY
 In a ring topology, each
computer is connected to
the next computer and the
last computer is connected
to the first.

Advantages
 It is less expensive than star
topology.
 All computers has equal
access to network.
Disadvantages
 If one node fails, the entire
network stops functioning.
 Adding and removing nodes
affects the network
TREE TOPOLOGY
 Tree topology has
combined features of
bus and star topologies.
Typically to form a tree
network, multiple star
topologies are
combined together
through Central cable
or bus.
MESH TOPOLOGY OR COMPLETELY
CONNECTED NETWORK
 In mesh topology, each
node has directly link, with
all other nodes.
Advantages
 It provides multiple routes
for date communication.
 It ensures data privacy.
 Communication is very fast.
Disadvantages
 It is very expensive.
HYBRID NETWORK
 Hybrid network
combines two or more
networks. A hybrid
topology is a type of
network topology that
uses two or more other
network topologies
including bus
topology, mesh
topology, ring
topology, star topology,
and tree topology.
METHODSTYPES
Types of Network
 Depending upon the geo graphical area covered by a
network, it is classified as:
 Personal Area Network (PAN)
 Metropolitan Area Network (MAN)
 Local Area Network (LAN)
 Wide Area Network (WAN)
Personal Area Network (PAN)
 A Personal Area Network is a computer network used for communication among
computer devices, including telephones, tablets, and personal digital assistants.
 The reach of a PAN is typically a few meters.
 Personal area network may be wired with computer buses such as USB and
FireWire.
 A Wireless Personal Area Network can also be made possible with wireless network
technologies such as, Bluetooth, Wireless USB.
Advantages & Disadvantages of PAN
Advantages:
 The PAN is a personal network of one or two person so there is no risk of
any leak of data.
 They are quick and easy.
 PAN usually need less technical skill.
 WPAN devices are easy portable.
Disadvantages:
 PAN have limited range.
 Devices are not compatible with each other.
 Devices with inbuilt WPANs are more expensive.
Metropolitan Area Network (MAN)
 MAN is a network system that covers area of a single city.
 It covers a smaller geographical area than a WAN.
 Mobile phones systems often use MAN.
 In this type of network, fiber optics cables are used as communication
media.
 It is very high speed network.
Advantages & Disadvantages of
MAN
Advantages:
 It provides a good back bone for a large network and provides greater
access to WANs
 The dual bus used in MAN helps the transmission of data in both direction.
 A MAN usually encompasses several blocks of a city or an entire city.
Disadvantages:
 More cables required for a MAN connection from one place to another.
 It is difficult to make the system secure from hackers and industrial spying.
 A Local Area Network is a group of computers and associated devices that
share a common communications line or wireless link.
 The computers used in LAN also require network interface card.
 They are connected to each other in a limited area. Typically, this area is
up to ONE KM.
 LAN is also known as Local Net.
Local Area Network (LAN)
Advantages & Disadvantages of LAN
ADVANTAGES:
 The resources can be shared among different users.
 All data is stored on the central server. So it becomes very easy to manage
the data.
 LAN is not very expensive.
 Data transmission in a LAN is very high.
DISADVANTAGES:
 If central server is infected by virus, then the important data stored on
server may be corrupted and the entire network may also be effected.
 All nodes depends on the central computer ( or Hub ), if any component of
server fails, then entire network will stop working.
Wide Area Network (WAN)
 A Wide Area Network is a type of computer network
that covers a large area such as different cities of
country or different countries of the world.
 Computers and other devices in a WAN are often
connected through telephone lines.
 The internet is the world’s largest WAN.
 Many large organizations make use of WAN as
enterprise network.
Advantages & Disadvantages
of WAN
Advantages:
 WAN covers a large geographical area.
 Message may be shared and communicated all over the world.
 The software can be shared between different users all over the
world.
 The data of an organization is stored in a single location. Everyone
on the network can use the same data.
Disadvantages:
 WAN becomes expensive to install. WANs are very costly.
 It is very expensive to run the WAN.
 WAN is very slow for data transmission.
 If the server fails, the entire network is effected.
INTERNETWORKING
TOOLS
Internetworking tools
Internetworking tools
 Interconnecting two or
more networks to form
a single network is
called Internetworking
and the resulting
network is called
internetwork.
 Internetworking may
or may not be differ in
protocol and topology.
 The goal of
Internetworking is to
Interconnect different
physical networks and
to hide their details,
enabling the
internetwork to function
as a single coordinated
unit.
Bridge
Bridge is used to connect
similar networks
segments. It may or
may not use the same
protocols at physical
and data link layers.
 For Example, a bridge
can connect two
networks, one of which
uses fiber-optic
communication
medium and the other
uses coaxial cable.
 However, networks
must use the same
high level protocols (e.
g, TCP/IP) to
communicate.
Router
 Router is used to connect two
or more different or similar
networks.
 Router is smarter than bridge
because they not only copy a
data from one network
segment to another but also
choose the best route for the
data by using information in a
routing table.
Gateway
 Gateway is used to
connect two or more
different types of
networks.
 It is the most
sophisticated(great)
Internetworking tool.
Sometimes gateway
perform the routing
information
 Gateway convert data
packet from one format
to another format.
Difference between Router and
Gateway
 Route traffic from one network to
another
 Supports dynamic routing.
 Work on layer 3 &layer 4 of OSI
Model.
 Router forwards packet of data
from one network to another.
Router Gateway
 Translate data from one
format to another format.
 Doesn't support dynamic
routing.
 Work up to layer 3 to 5 of OSI
Model.
 Gateway is a device that
convert one protocol format
to another.
OSI Model
History of OSI model
 In 1979 ISO & CCITT (two international standards
organization) developed a document that defined
similar networking models.
 In 1983, these two documents were merged to form a
standard called “The Basic Reference Model for Open
System Interconnection". It is simply called OSI Model.
 OSI Model had two major components, an abstract
model, called seven layer model & a set of specific
protocols.
 It was published in 1984 by ISO as standard ISO7498 &
CCITT as standard X200.
Charles bachman
The concept of seven layer model was provided by
the work of Charles Bachman at Honeywell
Information Services.
OSI MODEL
 OSI stands for Open System Interconnection.
 OSI is the most widely accepted model for
network communication.
 OSI model provides a useful structure for
defining and describing various process of
networking.
 It organizes the communication into seven
layers.
OSI MODEL
WIRELESS
NETWORKS
WIRELESS NETWORKS
 Wireless network is any type
of computer network that
uses wireless transmission
media to communicate
between nodes.
 Wireless networks are
computer networks that are
not connected by cables of
any kind.
For Example: Cellular Phones
Types of Wireless Computing Systems
Wireless computing systems are
of two types:
1. Fixed wireless systems
2. mobile wireless systems
1: Fixed Wireless Systems
 These wireless computing systems support little or
no mobility of their computing equipment.
2: Mobile Wireless Systems
 These wireless computing systems support
mobility of users and allow mobile users to access
at any time or place. Resulting computing is called
mobile computing or nomadic computing.
Issues in Wireless Computing Systems
Computing systems faces many challenges. The important
ones among them are:
1. Lower bandwidth
2. Variable bandwidth
3. Higher error rate
4. Increased security concern
5. Dynamically changing network
6. Lost or degraded connection
7. Support for routing and location management function
8. Limited power
Wireless Technologies
 Some wireless technologies are:
 2G and 3G Technologies
 Wireless LAN (WLAN)
 WiMAX
 Wireless Local Loop(WLLs)
2G and 3G Technologies
 2G was digital, circuit based and narrowband but
suitable for voice and limited data communication.
 3G is suitable for online multimedia, data applications
and voice.
Wireless LAN(WLAN)
 A Wireless Local Area Network (WLAN) is a LAN that
enables wireless communication among equipment
which are the part of LAN.
WiMAX
 WiMAX is a technology based on IEEE 802.16 for
providing wireless communication in WMANs
Wireless Local Loops(WLLs)
 Wireless Local Loop technology supports fixed
wireless systems and provides several MHz of
bandwidth which offer high-speed internet.
COMMUNICATION
PROTOCOL
COMMUNICATION PROTOCOL
 A set of rules for exchanging
data between computers
connected to a network is called
NETWORK PROTOCOL. It
provide a method for efficient
exchange of data between
senderreceiver , and for proper
interpretation of controls and
data transmitted as raw bits and
bytes.
RUles of COMMUNICATION PROTOCOL
1. Data sequencing
2. Data routing
3. Data formatting
4. Flow control
5. Error control
6. Procedure & order of transmission
7. Connection establishment
8. Data security
9. Log information
Concept of Layered PROTOCOL in
Network Design
• Modern computer networks have modular
design for easy and efficient handling of system.
They consist of several modules, which are
grouped into layers logically. Each layer has its
own set of protocols. A particular layer of one
machine communicates only with corresponding
layer of another machine by using protocols of
this layer.
Reason for Using Layered Protocol
1. Protocol of network are complex
2. Layered Protocol provides well-defined interface
between layers
3. Layering of protocols also allows interaction
between functionally paired layers
Network Interface Card (NIC)
 NIC is a hardware device that connects a computer
to a network, both functionally and physically. It is
Printed Circuit Board(PCB), which connects to one of
the expansion slot of computer, and provides a port
for attaching a network cable.NIC connects directly
to a computer’s IO bus. NIC ‘s ROM has the
network’s physical-layer communication protocol.
There are different NICs for different netwrks. NIC is
also called Network Card.
Presentation for slideshare

More Related Content

What's hot

Presentation on computer networking
Presentation on computer networkingPresentation on computer networking
Presentation on computer networking
Jyoti Tewari
 
Computer networks--networking
Computer networks--networkingComputer networks--networking
Computer networks--networking
Tańczący Z Kojotami
 
fundamental of information technology(1)
fundamental of information technology(1)fundamental of information technology(1)
fundamental of information technology(1)
Sorath Peetamber
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
vasanthimuniasamy
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
Haider Ali Malik
 
Computer network
Computer networkComputer network
Computer network
Soumya Behera
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
ritajindal2
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
Sujon Kumar Dey
 
introduction-to-computer-networking
introduction-to-computer-networkingintroduction-to-computer-networking
introduction-to-computer-networking
Sithu PM
 
Computer network ppt communication
Computer network ppt communicationComputer network ppt communication
Computer network ppt communication
Kajal Sharma
 
Networking ppt by swapi
Networking ppt by swapi Networking ppt by swapi
Networking ppt by swapi
Swapi Pawar
 
Network technology ppt
Network technology pptNetwork technology ppt
Network technology ppt
SanviGulati
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
Lokesh Kumar N
 
Computer networks
Computer networksComputer networks
Computer networks
Bilal Maqbool ツ
 
Classnote1
Classnote1Classnote1
Classnote1
MdAsaduzzaman163
 
Types of Network
Types of NetworkTypes of Network
Types of Network
ToufiqueAhmed13
 
A seminar on networks and networking
A seminar on networks and networkingA seminar on networks and networking
A seminar on networks and networking
NAGASHREE C
 
introduction to Networking
introduction to Networkingintroduction to Networking
introduction to Networking
iicecollege
 
COMUNICATION NETWORK NETWORK TOPOLOGY NETWORK CABLES NETWORK DEVICES
COMUNICATION NETWORK NETWORK TOPOLOGY NETWORK CABLES NETWORK DEVICESCOMUNICATION NETWORK NETWORK TOPOLOGY NETWORK CABLES NETWORK DEVICES
COMUNICATION NETWORK NETWORK TOPOLOGY NETWORK CABLES NETWORK DEVICES
COMSATS Institute of Information Technology
 
computer networks presentation
computer networks presentationcomputer networks presentation
computer networks presentation
Krishi Agrawal
 

What's hot (20)

Presentation on computer networking
Presentation on computer networkingPresentation on computer networking
Presentation on computer networking
 
Computer networks--networking
Computer networks--networkingComputer networks--networking
Computer networks--networking
 
fundamental of information technology(1)
fundamental of information technology(1)fundamental of information technology(1)
fundamental of information technology(1)
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
 
Computer network
Computer networkComputer network
Computer network
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
introduction-to-computer-networking
introduction-to-computer-networkingintroduction-to-computer-networking
introduction-to-computer-networking
 
Computer network ppt communication
Computer network ppt communicationComputer network ppt communication
Computer network ppt communication
 
Networking ppt by swapi
Networking ppt by swapi Networking ppt by swapi
Networking ppt by swapi
 
Network technology ppt
Network technology pptNetwork technology ppt
Network technology ppt
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
Computer networks
Computer networksComputer networks
Computer networks
 
Classnote1
Classnote1Classnote1
Classnote1
 
Types of Network
Types of NetworkTypes of Network
Types of Network
 
A seminar on networks and networking
A seminar on networks and networkingA seminar on networks and networking
A seminar on networks and networking
 
introduction to Networking
introduction to Networkingintroduction to Networking
introduction to Networking
 
COMUNICATION NETWORK NETWORK TOPOLOGY NETWORK CABLES NETWORK DEVICES
COMUNICATION NETWORK NETWORK TOPOLOGY NETWORK CABLES NETWORK DEVICESCOMUNICATION NETWORK NETWORK TOPOLOGY NETWORK CABLES NETWORK DEVICES
COMUNICATION NETWORK NETWORK TOPOLOGY NETWORK CABLES NETWORK DEVICES
 
computer networks presentation
computer networks presentationcomputer networks presentation
computer networks presentation
 

Similar to Presentation for slideshare

What is networking
What is networkingWhat is networking
What is networking
babyparul
 
Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)
saurabh goel
 
Networking Concepts.pdf
Networking Concepts.pdfNetworking Concepts.pdf
Networking Concepts.pdf
ODINARARCH
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
Akanksha Narkhede
 
Computer_Network_Basic.ppt
Computer_Network_Basic.pptComputer_Network_Basic.ppt
Computer_Network_Basic.ppt
Sarthak665910
 
Computer Network ssss ppt.pptx
Computer Network ssss ppt.pptxComputer Network ssss ppt.pptx
Computer Network ssss ppt.pptx
RamNivas42
 
Types of communication networks
Types of communication networksTypes of communication networks
Types of communication networks
Damaashaad
 
Fundamentals of Computer Networking - Shift Education of Technology
Fundamentals of Computer Networking - Shift Education of TechnologyFundamentals of Computer Networking - Shift Education of Technology
Fundamentals of Computer Networking - Shift Education of Technology
Raphaff
 
Networking
NetworkingNetworking
Networking
RajThakuri
 
Concept of Networking and Operating System.
Concept of Networking and Operating System.Concept of Networking and Operating System.
Concept of Networking and Operating System.
AnshulAnand21
 
Networking presentation
Networking presentationNetworking presentation
Networking presentation
Gajan Hai
 
Computer networking project
Computer networking projectComputer networking project
Computer networking project
Ashifimrankhan1
 
COMPUTER FUNDAMENTAL PART 3.pptx
COMPUTER FUNDAMENTAL PART 3.pptxCOMPUTER FUNDAMENTAL PART 3.pptx
COMPUTER FUNDAMENTAL PART 3.pptx
SURBHI SAROHA
 
454548 634160871407732500
454548 634160871407732500454548 634160871407732500
454548 634160871407732500
prabh_in
 
jaringan.pptx
jaringan.pptxjaringan.pptx
jaringan.pptx
HilmanTaufiqullah
 
Computer network ppt
Computer network pptComputer network ppt
Computer network ppt
Santosh Delwar
 
Vikash file full_final
Vikash file full_finalVikash file full_final
Vikash file full_final
Rahul Ranjan
 
NETWORKING
NETWORKINGNETWORKING
NETWORKING
junaid abbasi
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
Alisha Jain
 
Lecture-03 - Introduction To Network.pptx
Lecture-03 - Introduction To Network.pptxLecture-03 - Introduction To Network.pptx
Lecture-03 - Introduction To Network.pptx
Md. Sakhawat Hossain
 

Similar to Presentation for slideshare (20)

What is networking
What is networkingWhat is networking
What is networking
 
Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)
 
Networking Concepts.pdf
Networking Concepts.pdfNetworking Concepts.pdf
Networking Concepts.pdf
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
Computer_Network_Basic.ppt
Computer_Network_Basic.pptComputer_Network_Basic.ppt
Computer_Network_Basic.ppt
 
Computer Network ssss ppt.pptx
Computer Network ssss ppt.pptxComputer Network ssss ppt.pptx
Computer Network ssss ppt.pptx
 
Types of communication networks
Types of communication networksTypes of communication networks
Types of communication networks
 
Fundamentals of Computer Networking - Shift Education of Technology
Fundamentals of Computer Networking - Shift Education of TechnologyFundamentals of Computer Networking - Shift Education of Technology
Fundamentals of Computer Networking - Shift Education of Technology
 
Networking
NetworkingNetworking
Networking
 
Concept of Networking and Operating System.
Concept of Networking and Operating System.Concept of Networking and Operating System.
Concept of Networking and Operating System.
 
Networking presentation
Networking presentationNetworking presentation
Networking presentation
 
Computer networking project
Computer networking projectComputer networking project
Computer networking project
 
COMPUTER FUNDAMENTAL PART 3.pptx
COMPUTER FUNDAMENTAL PART 3.pptxCOMPUTER FUNDAMENTAL PART 3.pptx
COMPUTER FUNDAMENTAL PART 3.pptx
 
454548 634160871407732500
454548 634160871407732500454548 634160871407732500
454548 634160871407732500
 
jaringan.pptx
jaringan.pptxjaringan.pptx
jaringan.pptx
 
Computer network ppt
Computer network pptComputer network ppt
Computer network ppt
 
Vikash file full_final
Vikash file full_finalVikash file full_final
Vikash file full_final
 
NETWORKING
NETWORKINGNETWORKING
NETWORKING
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Lecture-03 - Introduction To Network.pptx
Lecture-03 - Introduction To Network.pptxLecture-03 - Introduction To Network.pptx
Lecture-03 - Introduction To Network.pptx
 

Recently uploaded

Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 

Recently uploaded (20)

Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 

Presentation for slideshare

  • 1.
  • 3. COMPUTER NETWORK , NETWORK MODELS AND TOPOLOGIES
  • 4. COMPUTER NETWORK  Computer network connects computers in a manner to enable meaningful transmission and exchange of data between them.  In computer network we can share information, share resources (hardware, software).  Computer network is also called Information network. For Example: Internet
  • 5. HISTORY OF COMPUTER NETWORK  The first-ever Computer-to-Computer link was established on ARPANET (Advance Research Project Agency Network) , the precursor to the Internet, on October 29, 1969.  The message on the ARPANET was sent by UCLA student programmer Charles S Kline.
  • 6. NETWORK TOPOLOGIES  A Network Topology refers to the way in which nodes are connected in network.
  • 7. BUS TOPOLOGY  In Bus Topology, all nodes are connected to a single communication line.  Advantages  Reduce number of physical line.  Failure of node does not effect the network  . Disadvantages  Communication line fails, the whole network fails.
  • 8. STAR TOPOLOGY  In a star topology all computers or nodes are directly connected to a central device called hub or switch. Advantages  New nodes can easily added and removed to and from the central device.  If any node fails, other nodes are not affected  . Disadvantages  If the central device fails the whole network fails.
  • 9. RING TOPOLOGY  In a ring topology, each computer is connected to the next computer and the last computer is connected to the first.  Advantages  It is less expensive than star topology.  All computers has equal access to network. Disadvantages  If one node fails, the entire network stops functioning.  Adding and removing nodes affects the network
  • 10. TREE TOPOLOGY  Tree topology has combined features of bus and star topologies. Typically to form a tree network, multiple star topologies are combined together through Central cable or bus.
  • 11. MESH TOPOLOGY OR COMPLETELY CONNECTED NETWORK  In mesh topology, each node has directly link, with all other nodes. Advantages  It provides multiple routes for date communication.  It ensures data privacy.  Communication is very fast. Disadvantages  It is very expensive.
  • 12. HYBRID NETWORK  Hybrid network combines two or more networks. A hybrid topology is a type of network topology that uses two or more other network topologies including bus topology, mesh topology, ring topology, star topology, and tree topology.
  • 14. Types of Network  Depending upon the geo graphical area covered by a network, it is classified as:  Personal Area Network (PAN)  Metropolitan Area Network (MAN)  Local Area Network (LAN)  Wide Area Network (WAN)
  • 15. Personal Area Network (PAN)  A Personal Area Network is a computer network used for communication among computer devices, including telephones, tablets, and personal digital assistants.  The reach of a PAN is typically a few meters.  Personal area network may be wired with computer buses such as USB and FireWire.  A Wireless Personal Area Network can also be made possible with wireless network technologies such as, Bluetooth, Wireless USB.
  • 16. Advantages & Disadvantages of PAN Advantages:  The PAN is a personal network of one or two person so there is no risk of any leak of data.  They are quick and easy.  PAN usually need less technical skill.  WPAN devices are easy portable. Disadvantages:  PAN have limited range.  Devices are not compatible with each other.  Devices with inbuilt WPANs are more expensive.
  • 17. Metropolitan Area Network (MAN)  MAN is a network system that covers area of a single city.  It covers a smaller geographical area than a WAN.  Mobile phones systems often use MAN.  In this type of network, fiber optics cables are used as communication media.  It is very high speed network.
  • 18. Advantages & Disadvantages of MAN Advantages:  It provides a good back bone for a large network and provides greater access to WANs  The dual bus used in MAN helps the transmission of data in both direction.  A MAN usually encompasses several blocks of a city or an entire city. Disadvantages:  More cables required for a MAN connection from one place to another.  It is difficult to make the system secure from hackers and industrial spying.
  • 19.  A Local Area Network is a group of computers and associated devices that share a common communications line or wireless link.  The computers used in LAN also require network interface card.  They are connected to each other in a limited area. Typically, this area is up to ONE KM.  LAN is also known as Local Net. Local Area Network (LAN)
  • 20. Advantages & Disadvantages of LAN ADVANTAGES:  The resources can be shared among different users.  All data is stored on the central server. So it becomes very easy to manage the data.  LAN is not very expensive.  Data transmission in a LAN is very high. DISADVANTAGES:  If central server is infected by virus, then the important data stored on server may be corrupted and the entire network may also be effected.  All nodes depends on the central computer ( or Hub ), if any component of server fails, then entire network will stop working.
  • 21. Wide Area Network (WAN)  A Wide Area Network is a type of computer network that covers a large area such as different cities of country or different countries of the world.  Computers and other devices in a WAN are often connected through telephone lines.  The internet is the world’s largest WAN.  Many large organizations make use of WAN as enterprise network.
  • 22. Advantages & Disadvantages of WAN Advantages:  WAN covers a large geographical area.  Message may be shared and communicated all over the world.  The software can be shared between different users all over the world.  The data of an organization is stored in a single location. Everyone on the network can use the same data. Disadvantages:  WAN becomes expensive to install. WANs are very costly.  It is very expensive to run the WAN.  WAN is very slow for data transmission.  If the server fails, the entire network is effected.
  • 25. Internetworking tools  Interconnecting two or more networks to form a single network is called Internetworking and the resulting network is called internetwork.  Internetworking may or may not be differ in protocol and topology.  The goal of Internetworking is to Interconnect different physical networks and to hide their details, enabling the internetwork to function as a single coordinated unit.
  • 26. Bridge Bridge is used to connect similar networks segments. It may or may not use the same protocols at physical and data link layers.  For Example, a bridge can connect two networks, one of which uses fiber-optic communication medium and the other uses coaxial cable.  However, networks must use the same high level protocols (e. g, TCP/IP) to communicate.
  • 27. Router  Router is used to connect two or more different or similar networks.  Router is smarter than bridge because they not only copy a data from one network segment to another but also choose the best route for the data by using information in a routing table.
  • 28. Gateway  Gateway is used to connect two or more different types of networks.  It is the most sophisticated(great) Internetworking tool. Sometimes gateway perform the routing information  Gateway convert data packet from one format to another format.
  • 29. Difference between Router and Gateway  Route traffic from one network to another  Supports dynamic routing.  Work on layer 3 &layer 4 of OSI Model.  Router forwards packet of data from one network to another. Router Gateway  Translate data from one format to another format.  Doesn't support dynamic routing.  Work up to layer 3 to 5 of OSI Model.  Gateway is a device that convert one protocol format to another.
  • 31. History of OSI model  In 1979 ISO & CCITT (two international standards organization) developed a document that defined similar networking models.  In 1983, these two documents were merged to form a standard called “The Basic Reference Model for Open System Interconnection". It is simply called OSI Model.  OSI Model had two major components, an abstract model, called seven layer model & a set of specific protocols.  It was published in 1984 by ISO as standard ISO7498 & CCITT as standard X200.
  • 32. Charles bachman The concept of seven layer model was provided by the work of Charles Bachman at Honeywell Information Services.
  • 33. OSI MODEL  OSI stands for Open System Interconnection.  OSI is the most widely accepted model for network communication.  OSI model provides a useful structure for defining and describing various process of networking.  It organizes the communication into seven layers.
  • 36. WIRELESS NETWORKS  Wireless network is any type of computer network that uses wireless transmission media to communicate between nodes.  Wireless networks are computer networks that are not connected by cables of any kind. For Example: Cellular Phones
  • 37. Types of Wireless Computing Systems Wireless computing systems are of two types: 1. Fixed wireless systems 2. mobile wireless systems
  • 38. 1: Fixed Wireless Systems  These wireless computing systems support little or no mobility of their computing equipment. 2: Mobile Wireless Systems  These wireless computing systems support mobility of users and allow mobile users to access at any time or place. Resulting computing is called mobile computing or nomadic computing.
  • 39. Issues in Wireless Computing Systems Computing systems faces many challenges. The important ones among them are: 1. Lower bandwidth 2. Variable bandwidth 3. Higher error rate 4. Increased security concern 5. Dynamically changing network 6. Lost or degraded connection 7. Support for routing and location management function 8. Limited power
  • 40. Wireless Technologies  Some wireless technologies are:  2G and 3G Technologies  Wireless LAN (WLAN)  WiMAX  Wireless Local Loop(WLLs)
  • 41. 2G and 3G Technologies  2G was digital, circuit based and narrowband but suitable for voice and limited data communication.  3G is suitable for online multimedia, data applications and voice. Wireless LAN(WLAN)  A Wireless Local Area Network (WLAN) is a LAN that enables wireless communication among equipment which are the part of LAN.
  • 42. WiMAX  WiMAX is a technology based on IEEE 802.16 for providing wireless communication in WMANs Wireless Local Loops(WLLs)  Wireless Local Loop technology supports fixed wireless systems and provides several MHz of bandwidth which offer high-speed internet.
  • 44. COMMUNICATION PROTOCOL  A set of rules for exchanging data between computers connected to a network is called NETWORK PROTOCOL. It provide a method for efficient exchange of data between senderreceiver , and for proper interpretation of controls and data transmitted as raw bits and bytes.
  • 45. RUles of COMMUNICATION PROTOCOL 1. Data sequencing 2. Data routing 3. Data formatting 4. Flow control 5. Error control 6. Procedure & order of transmission 7. Connection establishment 8. Data security 9. Log information
  • 46. Concept of Layered PROTOCOL in Network Design • Modern computer networks have modular design for easy and efficient handling of system. They consist of several modules, which are grouped into layers logically. Each layer has its own set of protocols. A particular layer of one machine communicates only with corresponding layer of another machine by using protocols of this layer.
  • 47. Reason for Using Layered Protocol 1. Protocol of network are complex 2. Layered Protocol provides well-defined interface between layers 3. Layering of protocols also allows interaction between functionally paired layers
  • 48. Network Interface Card (NIC)  NIC is a hardware device that connects a computer to a network, both functionally and physically. It is Printed Circuit Board(PCB), which connects to one of the expansion slot of computer, and provides a port for attaching a network cable.NIC connects directly to a computer’s IO bus. NIC ‘s ROM has the network’s physical-layer communication protocol. There are different NICs for different netwrks. NIC is also called Network Card.