SlideShare a Scribd company logo
Network
Network
Network)
6
-
2. Metropolitan Area Network
(MAN)


          LAN


        LAN

                 ,       ,
           ,
1. Local Area Network (LAN)




          ,            Access
  Point
3. Wide Area Networks (WAN)

                 LAN


          MAN


                   Leased
line)
4. Intranet
5. Extranet


Intranet)




              Virtual
6. Internet




“                  ” (A
network of networks)
Software)
Hardware)




1.1
  1.2
  1.3
  1.4
2
 2.1.
Operating System Software)




         Window 95 ,
Windows 98
2.
Application Software)




                     Excel
, Photoshop    Oracle
3
   1
         Centrallized
Networks
   2
Peer-to Peer
   3
1.
http://thaiwinadmin.blogspot.com/20
07/12/kb-122007-02.html

 2. http://ku-
scmicro36bkk.tripod.com/default.htm

3.http://irrigation.rid.go.th/rid15/ppn
/Knowledge/Networks%20Technology
/network8.htm
1.   Network
2.


     LAN,MAN,WAN

     Intranet, Extranet,
Internet

     Hardware, Software
3.   Hardware)
4. Wide Area Networks




                  LAN
2
1
3
2
4
3
4
เทคโนโลยีสารสนเทศ

More Related Content

What's hot

Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Dân Chơi
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
Muhammad Zia
 
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security PresentationSuper Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
System ID Warehouse
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
kentquirk
 
5.ระบบเครือข่ายคอมพิวเตอร์ไรสาย
5.ระบบเครือข่ายคอมพิวเตอร์ไรสาย5.ระบบเครือข่ายคอมพิวเตอร์ไรสาย
5.ระบบเครือข่ายคอมพิวเตอร์ไรสายSaksakon Sanor
 
หน่วยที่ 5ระบบเครือข่ายคอมพิวเตอร์ไร้สาย
หน่วยที่ 5ระบบเครือข่ายคอมพิวเตอร์ไร้สายหน่วยที่ 5ระบบเครือข่ายคอมพิวเตอร์ไร้สาย
หน่วยที่ 5ระบบเครือข่ายคอมพิวเตอร์ไร้สายsoifha
 
Network Protocol Analyzer
Network Protocol AnalyzerNetwork Protocol Analyzer
Network Protocol AnalyzerSourav Roy
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
Chetan Kumar S
 
Network Protocol Analyzer
Network Protocol AnalyzerNetwork Protocol Analyzer
Network Protocol AnalyzerSourav Roy
 
Tor the onion router
Tor   the onion routerTor   the onion router
Tor the onion router
n|u - The Open Security Community
 
Anonymous Connections And Onion Routing
Anonymous Connections And Onion RoutingAnonymous Connections And Onion Routing
Anonymous Connections And Onion RoutingAli Habeeb
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
Vishal Agarwal
 
How To Hack Wireless Internet Connections
How To Hack Wireless Internet ConnectionsHow To Hack Wireless Internet Connections
How To Hack Wireless Internet Connectionsguest85e156e
 
Introduction to Tor
Introduction to TorIntroduction to Tor
Introduction to Tor
Jaskaran Narula
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hackingMihir Shah
 
Tor Pivoting Networks Share
Tor Pivoting Networks Share Tor Pivoting Networks Share
Tor Pivoting Networks Share
Ricardo Robles, M.Eng.
 

What's hot (19)

kuldeep
kuldeepkuldeep
kuldeep
 
Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security PresentationSuper Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
 
Set review 1
Set review 1Set review 1
Set review 1
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Sniffer[1]
Sniffer[1]Sniffer[1]
Sniffer[1]
 
5.ระบบเครือข่ายคอมพิวเตอร์ไรสาย
5.ระบบเครือข่ายคอมพิวเตอร์ไรสาย5.ระบบเครือข่ายคอมพิวเตอร์ไรสาย
5.ระบบเครือข่ายคอมพิวเตอร์ไรสาย
 
หน่วยที่ 5ระบบเครือข่ายคอมพิวเตอร์ไร้สาย
หน่วยที่ 5ระบบเครือข่ายคอมพิวเตอร์ไร้สายหน่วยที่ 5ระบบเครือข่ายคอมพิวเตอร์ไร้สาย
หน่วยที่ 5ระบบเครือข่ายคอมพิวเตอร์ไร้สาย
 
Network Protocol Analyzer
Network Protocol AnalyzerNetwork Protocol Analyzer
Network Protocol Analyzer
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
 
Network Protocol Analyzer
Network Protocol AnalyzerNetwork Protocol Analyzer
Network Protocol Analyzer
 
Tor the onion router
Tor   the onion routerTor   the onion router
Tor the onion router
 
Anonymous Connections And Onion Routing
Anonymous Connections And Onion RoutingAnonymous Connections And Onion Routing
Anonymous Connections And Onion Routing
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
How To Hack Wireless Internet Connections
How To Hack Wireless Internet ConnectionsHow To Hack Wireless Internet Connections
How To Hack Wireless Internet Connections
 
Introduction to Tor
Introduction to TorIntroduction to Tor
Introduction to Tor
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 
Tor Pivoting Networks Share
Tor Pivoting Networks Share Tor Pivoting Networks Share
Tor Pivoting Networks Share
 

Viewers also liked

Paleocristiano
PaleocristianoPaleocristiano
Paleocristiano
Pablo Echave
 
Bizancio
BizancioBizancio
Bizancio
Pablo Echave
 
เทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศเทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศKaii Eiei
 
Mayas
MayasMayas
拓扑学奇趣
拓扑学奇趣拓扑学奇趣
拓扑学奇趣Zhouxin Xi
 
การสอนโดยใช้สื่อการสอนสร้าง
การสอนโดยใช้สื่อการสอนสร้างการสอนโดยใช้สื่อการสอนสร้าง
การสอนโดยใช้สื่อการสอนสร้างpynk Prae
 

Viewers also liked (6)

Paleocristiano
PaleocristianoPaleocristiano
Paleocristiano
 
Bizancio
BizancioBizancio
Bizancio
 
เทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศเทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศ
 
Mayas
MayasMayas
Mayas
 
拓扑学奇趣
拓扑学奇趣拓扑学奇趣
拓扑学奇趣
 
การสอนโดยใช้สื่อการสอนสร้าง
การสอนโดยใช้สื่อการสอนสร้างการสอนโดยใช้สื่อการสอนสร้าง
การสอนโดยใช้สื่อการสอนสร้าง
 

Similar to เทคโนโลยีสารสนเทศ

งานนำเสนอ..
งานนำเสนอ..งานนำเสนอ..
งานนำเสนอ..amphaiboon
 
งานPowerpoint ลูกศร1
งานPowerpoint ลูกศร1งานPowerpoint ลูกศร1
งานPowerpoint ลูกศร1amphaiboon
 
บทที่5 ระบบเครือข่าย(network)
บทที่5 ระบบเครือข่าย(network)บทที่5 ระบบเครือข่าย(network)
บทที่5 ระบบเครือข่าย(network)Beauso English
 
งานPowerpoint ลูกศร1
งานPowerpoint ลูกศร1งานPowerpoint ลูกศร1
งานPowerpoint ลูกศร1amphaiboon
 
เทคโนโลยีสารสนเทศสำหรับครู
เทคโนโลยีสารสนเทศสำหรับครูเทคโนโลยีสารสนเทศสำหรับครู
เทคโนโลยีสารสนเทศสำหรับครูBeauso English
 
สาระน่ารู้เทคโนโลยีสารสนเทศ
สาระน่ารู้เทคโนโลยีสารสนเทศสาระน่ารู้เทคโนโลยีสารสนเทศ
สาระน่ารู้เทคโนโลยีสารสนเทศAe Naiong
 
สาระน่ารู้เทคโนโลยีสารสนเทศ
สาระน่ารู้เทคโนโลยีสารสนเทศสาระน่ารู้เทคโนโลยีสารสนเทศ
สาระน่ารู้เทคโนโลยีสารสนเทศAomam Rattiya
 
شبكات+الحاسوب+وفوائدها+4
شبكات+الحاسوب+وفوائدها+4شبكات+الحاسوب+وفوائدها+4
شبكات+الحاسوب+وفوائدها+4
mohsen mahmoud
 
บทที่5
บทที่5 บทที่5
บทที่5 airly2011
 
บทที่5
บทที่5 บทที่5
บทที่5 airly2011
 
บทที่5
บทที่5 บทที่5
บทที่5 airly2011
 
ระบบเครือข่าย Lan
ระบบเครือข่าย Lanระบบเครือข่าย Lan
ระบบเครือข่าย LanWiyarat Pibunkun
 
Weaponization of IoT
Weaponization of IoTWeaponization of IoT
Weaponization of IoT
Jose L. Quiñones-Borrero
 
Computer network
Computer networkComputer network
Computer network
samiksha padgilwar
 
Computer network
Computer networkComputer network
Computer network
samiksha padgilwar
 
Coimputer network
Coimputer networkCoimputer network
Coimputer network
sujenthiran k
 

Similar to เทคโนโลยีสารสนเทศ (20)

งานนำเสนอ..
งานนำเสนอ..งานนำเสนอ..
งานนำเสนอ..
 
งานPowerpoint ลูกศร1
งานPowerpoint ลูกศร1งานPowerpoint ลูกศร1
งานPowerpoint ลูกศร1
 
บทที่5 ระบบเครือข่าย(network)
บทที่5 ระบบเครือข่าย(network)บทที่5 ระบบเครือข่าย(network)
บทที่5 ระบบเครือข่าย(network)
 
งานPowerpoint ลูกศร1
งานPowerpoint ลูกศร1งานPowerpoint ลูกศร1
งานPowerpoint ลูกศร1
 
เทคโนโลยีสารสนเทศสำหรับครู
เทคโนโลยีสารสนเทศสำหรับครูเทคโนโลยีสารสนเทศสำหรับครู
เทคโนโลยีสารสนเทศสำหรับครู
 
สาระน่ารู้เทคโนโลยีสารสนเทศ
สาระน่ารู้เทคโนโลยีสารสนเทศสาระน่ารู้เทคโนโลยีสารสนเทศ
สาระน่ารู้เทคโนโลยีสารสนเทศ
 
สาระน่ารู้เทคโนโลยีสารสนเทศ
สาระน่ารู้เทคโนโลยีสารสนเทศสาระน่ารู้เทคโนโลยีสารสนเทศ
สาระน่ารู้เทคโนโลยีสารสนเทศ
 
شبكات+الحاسوب+وفوائدها+4
شبكات+الحاسوب+وفوائدها+4شبكات+الحاسوب+وفوائدها+4
شبكات+الحاسوب+وفوائدها+4
 
บทที่5
บทที่5 บทที่5
บทที่5
 
บทที่5
บทที่5 บทที่5
บทที่5
 
บทที่5
บทที่5 บทที่5
บทที่5
 
Extranet..
Extranet..Extranet..
Extranet..
 
Extranet..
Extranet..Extranet..
Extranet..
 
ระบบเครือข่าย Lan
ระบบเครือข่าย Lanระบบเครือข่าย Lan
ระบบเครือข่าย Lan
 
Extranet
ExtranetExtranet
Extranet
 
sunil patel
sunil patelsunil patel
sunil patel
 
Weaponization of IoT
Weaponization of IoTWeaponization of IoT
Weaponization of IoT
 
Computer network
Computer networkComputer network
Computer network
 
Computer network
Computer networkComputer network
Computer network
 
Coimputer network
Coimputer networkCoimputer network
Coimputer network
 

Recently uploaded

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 

Recently uploaded (20)

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 

เทคโนโลยีสารสนเทศ