SlideShare a Scribd company logo
1 of 35
INTRODUCTION TO
COMPUTER NETWORKS
Ms. Suchita Bhovar
SMT. P. N. DOSHI WOMEN’S COLLEGE
BACHELOR OF COMPUTER APPLICATIONS
Introduction to Computer Networks
INTRODUCTION TO COMPUTER
NETWORKS
Computer Networks
Computer network
connects two or more
autonomous computers.
The computers can be
geographically located
anywhere.
Introduction to Computer Networks
LAN, MAN & WAN
Introduction to Computer Networks
Network in small geographical Area (Room, Building
or a Campus) is called LAN (Local Area Network)
speed (10 to 100 mbps)
Network in a City is call MAN (Metropolitan Area
Network)
Network spread geographically (Country or across
Globe) is called WAN (Wide Area Network)
LAN (Local Area Network)
MAN(Metropolitan Area
Network)
WAN (Wide Area Network)
Applications of Networks
Introduction to Computer Networks
Resource Sharing
Hardware (computing resources, disks, printers)
Software (application software)
Information Sharing
Easy accessibility from anywhere (files, databases)
Search Capability (WWW)
Communication
Email
Message broadcast
Remote computing
Distributed processing (GRID Computing)
Network Topology
The network topology
defines the way in
which computers,
printers, and other
devices are connected.
A network topology
describes the layout of
the wire and devices as
well as the paths used
by data transmissions.
Introduction to Computer Networks
Bus Topology
Commonly referred to
as a linear bus, all the
devices on a bus
topology are connected
by one single cable.
Key characteristics
Flexible
Expandable
Moderate Reliability
Moderate performance
Introduction to Computer Networks
BUS TOPOLOGY
• Advantages
– Easy to install
– Requires less
cabling than
mesh,star,tree,ring.
• Disadvantages
– Difficult to add device
– Limitation on
maximum number of
devices linked.
– Fault identification and
isolation is the
problem
– Any fault in cable can
stop the entire
transmission
Star & Tree Topology
Introduction to Computer Networks
The star topology is the most
commonly used architecture in
Ethernet LANs.
When installed, the star
topology resembles spokes in
a bicycle wheel.
Larger networks use the
extended star topology also
called tree topology. When
used with network devices that
filter frames or packets, like
bridges, switches, and routers,
this topology significantly
reduces the traffic on the wires
by sending packets only to the
wires of the destination host.
STAR & TREE TOPOLOGY
ADVANTAGES
• Less expensive
• It is easy to install and
configure
• Addition and deletion
involves only one
connection between hub
and device
• It require less cabling
• Fault identification and
removal is easy
DISADVANTAGES
• If hub fails whole network
goes down
• There is no alternate
routing
• It require most cable than
tree.
Ring Topology
Introduction to Computer Networks
A frame travels around the ring,
stopping at each node. If a node
wants to transmit data, it adds the
data as well as the destination
address to the frame.
The frame then continues around
the ring until it finds the
destination node, which takes the
data out of the frame.
Single ring – All the devices on
the network share a single cable
Dual ring – The dual ring topology
allows data to be sent in both
directions.
RING TOPOLOGY
ADVANTAGES
• It is easy to install and
reconfigure
• Addition and deletion
require only to connection
• Alarm is issued if signal
problem issue
• Fault identification and
removal is easy
DISADVANTAGES
• A break the ring disables
the entire network. This
can be removed by using
dual ring or switch that
closes the break.
Mesh Topology
The mesh topology
connects all devices
(nodes) to each other
for redundancy and
fault tolerance.
It is used in WANs to
interconnect LANs and
for mission critical
networks like those
used by banks and
financial institutions.
Implementing the mesh
topology is expensive
and difficult.
Introduction to Computer Networks
MESH TOPOLOGY
ADVANTAGES
• There is no traffic problem due
to dedicated point to point link.
• The network is robust as if one
link becomes unusable then
also the network can work.
• The Network is very secure as
only intended receiver will get
the data.
• Fault identification and
removal is very easy.
DISADVANTAGES
• Installation is difficult as
every device is connected
to every other devices.
• Cost is very high due to
more cabling and more
ports for each device.
• Addition and deletion is
difficult as it will remove
all connection.
Network Components
Introduction to Computer Networks
Physical Media
Interconnecting Devices
Computers
Networking Software
Applications
Networking Media
Networking media can
be defined simply as
the means by which
signals (data) are sent
from one computer to
another (either by cable
or wireless means).
Introduction to Computer Networks
Networking Devices
Introduction to Computer Networks
HUB, Switches, Routers,
Wireless Access Points,
Modems etc. are required
to link them together.
These are called
internetworking devices.
CONNECTING
DEVICES
NETWORKING
DEVICES
REPEATER BRIDGES
INTER NETWORKING
DEVICES
ROUTER GATEWAY
REPEATERS
• It is an electronic device that operate on only the physical layer.
• Its job is to regenerate the signal over the same network before the signal
becomes too weak or corrupted so as to extend the length to which the
signal can be transmitted over the same network.
• An important point to be noted about repeaters is that they do not amplify
the signal.
• When the signal becomes weak, they copy the signal bit by bit and
regenerate it at the original strength.
• It is a 2 port device.
BRIDGES
• A bridge operates at data link layer. A bridge is a repeater.
• It is also used for interconnecting two LANs working on the same protocol. It has a
single input and single output port, thus making it a 2 port device.
Types of Bridges
• Simple Bridge: links two segments and contains a table the list address of all the
station included in each of them.
• Multi Bridge: connect more than two LAN
• Transport Bridge: builds table of station addresses on its own as it performs its bridge
function.
BRIDGE
Routers
• A router is a device like a switch
that routes data packets based
on their IP addresses.
• Router is mainly a Network
Layer device.
• Routers normally connect LANs
and WANs together and have a
dynamically updating routing
table based on which they make
decisions on routing the data
packets.
• Router divide broadcast
domains of hosts connected
through it.
Switches
• A switch is a multiport bridge with a buffer and a design that can boost its efficiency(a large
number of ports imply less traffic) and performance.
• A switch is a data link layer device.
• The switch can perform error checking before forwarding data, that makes it very efficient
as it does not forward packets that have errors and forward good packets selectively to
correct port only.
HUB
• A hub is basically a multiport repeater.
• A hub connects multiple wires coming from different branches, for
example, the connector in star topology which connects different
stations.
• Hubs cannot filter data, so data packets are sent to all connected
devices.
• Also, they do not have intelligence to find out best path for data
packets which leads to inefficiencies and wastage.
BANDWIDTH
• Bandwidth describes the maximum data
transfer rate of a network or Internet
connection.
• It measures how much data can be sent over a
specific connection in a given amount of time.
• For example, a gigabit Ethernet connection
has a bandwidth of 1,000 Mbps (125
megabytes per second)
BANDWIDTH
Types of Hub
• Active Hub:-
– These are the hubs which have their own power supply and can
clean, boost and relay the signal along with the network.
– It serves both as a repeater as well as wiring centre.
• These are used to extend the maximum distance between
nodes.
• Passive Hub :-
– These are the hubs which collect wiring from nodes and power
supply from active hub.
– These hubs relay signals onto the network without cleaning and
boosting them and can’t be used to extend the distance between
nodes.
Computers: Clients and Servers
In a client/server
network arrangement,
network services are
located in a dedicated
computer whose only
function is to respond
to the requests of
clients.
The server contains the
file, print, application,
security, and other
services in a central
computer that is
continuously available
to respond to client
requests.
Introduction to Computer Networks
TCP/IP
• TCP/IP, or the Transmission Control
Protocol/Internet Protocol, is a suite of
communication protocols used to
interconnect network devices on the
internet.
• TCP/IP can also be used as a
communications protocol in a private
network (an intranet or an extranet).
How TCP/IP works
• TCP/IP uses the client/server model of communication in which a
user or machine (a client) is provided a service (like sending a
webpage) by another computer (a server) in the network.
• Collectively, the TCP/IP suite of protocols is classified as stateless,
which means each client request is considered new because it is
unrelated to previous requests. Being stateless frees up network
paths so they can be used continuously.
• The transport layer itself, however, is stateful. It transmits a single
message, and its connection remains in place until all the packets in
a message have been received and reassembled at the destination.
Networking Protocol: TCP/IP
Introduction to Computer Networks
Applications
E-mail
Searchable Data (Web Sites)
E-Commerce
News Groups
Internet Telephony (VoIP)
Video Conferencing
Chat Groups
Instant Messengers
Internet Radio
Introduction to Computer Networks

More Related Content

Similar to networking.ppt

Ccna(routing &and switching)
Ccna(routing &and switching)Ccna(routing &and switching)
Ccna(routing &and switching)Shweta Kumari
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkAtika Zaimi
 
Install network cable module CSS NC2
Install network cable module CSS NC2Install network cable module CSS NC2
Install network cable module CSS NC2wilfredo dela cerna
 
Computer networks
Computer networksComputer networks
Computer networkssamina khan
 
Network Management Devices
Network Management DevicesNetwork Management Devices
Network Management DevicesRahul P
 
Network Components
Network ComponentsNetwork Components
Network ComponentsIfrad Mahbub
 
ifrad01605545networkcomponents-181123160910.pdf
ifrad01605545networkcomponents-181123160910.pdfifrad01605545networkcomponents-181123160910.pdf
ifrad01605545networkcomponents-181123160910.pdfkashafishfaq21
 
Computer network updated
Computer network updatedComputer network updated
Computer network updatedKing Abidi
 
An Introduction to Networking
An Introduction to Networking An Introduction to Networking
An Introduction to Networking SrikantaSahu10
 
Fundamentals of Computer Networking - Shift Education of Technology
Fundamentals of Computer Networking - Shift Education of TechnologyFundamentals of Computer Networking - Shift Education of Technology
Fundamentals of Computer Networking - Shift Education of TechnologyRaphaff
 
Computer Network Components
Computer Network  ComponentsComputer Network  Components
Computer Network ComponentsJyoti Akhter
 
Computer network and email basic concepts
Computer network and email basic conceptsComputer network and email basic concepts
Computer network and email basic conceptsMd Irfan Ansari
 
1 introduction to-networking
1 introduction to-networking1 introduction to-networking
1 introduction to-networkingNor Zailani
 

Similar to networking.ppt (20)

Network devices
Network devicesNetwork devices
Network devices
 
Ccna(routing &and switching)
Ccna(routing &and switching)Ccna(routing &and switching)
Ccna(routing &and switching)
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer network
 
Wireless communications
Wireless communicationsWireless communications
Wireless communications
 
Networking(CPM & PERT)
Networking(CPM & PERT)Networking(CPM & PERT)
Networking(CPM & PERT)
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Install network cable module CSS NC2
Install network cable module CSS NC2Install network cable module CSS NC2
Install network cable module CSS NC2
 
Computer networks
Computer networksComputer networks
Computer networks
 
Network Management Devices
Network Management DevicesNetwork Management Devices
Network Management Devices
 
Network Components
Network ComponentsNetwork Components
Network Components
 
ifrad01605545networkcomponents-181123160910.pdf
ifrad01605545networkcomponents-181123160910.pdfifrad01605545networkcomponents-181123160910.pdf
ifrad01605545networkcomponents-181123160910.pdf
 
Wireless communications
Wireless communicationsWireless communications
Wireless communications
 
Unit2.2
Unit2.2Unit2.2
Unit2.2
 
Computer network updated
Computer network updatedComputer network updated
Computer network updated
 
COMPUTER APPLICATIONS Module 3.pptx
COMPUTER APPLICATIONS Module 3.pptxCOMPUTER APPLICATIONS Module 3.pptx
COMPUTER APPLICATIONS Module 3.pptx
 
An Introduction to Networking
An Introduction to Networking An Introduction to Networking
An Introduction to Networking
 
Fundamentals of Computer Networking - Shift Education of Technology
Fundamentals of Computer Networking - Shift Education of TechnologyFundamentals of Computer Networking - Shift Education of Technology
Fundamentals of Computer Networking - Shift Education of Technology
 
Computer Network Components
Computer Network  ComponentsComputer Network  Components
Computer Network Components
 
Computer network and email basic concepts
Computer network and email basic conceptsComputer network and email basic concepts
Computer network and email basic concepts
 
1 introduction to-networking
1 introduction to-networking1 introduction to-networking
1 introduction to-networking
 

More from suchita74

Characteristics or Nature of Financial Services.pptx
Characteristics or Nature of Financial Services.pptxCharacteristics or Nature of Financial Services.pptx
Characteristics or Nature of Financial Services.pptxsuchita74
 
blackboxandwhiteboxtesting in software testing.ppt
blackboxandwhiteboxtesting in software testing.pptblackboxandwhiteboxtesting in software testing.ppt
blackboxandwhiteboxtesting in software testing.pptsuchita74
 
Agile Development Models in Software EngineeringE.pptx
Agile Development Models in Software EngineeringE.pptxAgile Development Models in Software EngineeringE.pptx
Agile Development Models in Software EngineeringE.pptxsuchita74
 
gantt chart & pert in Software engineering.pptx
gantt chart & pert in Software engineering.pptxgantt chart & pert in Software engineering.pptx
gantt chart & pert in Software engineering.pptxsuchita74
 
ITERATIVE model in software engineering.pptx
ITERATIVE model in software engineering.pptxITERATIVE model in software engineering.pptx
ITERATIVE model in software engineering.pptxsuchita74
 
The role of certifying authorities in IPR
The role of certifying authorities in IPRThe role of certifying authorities in IPR
The role of certifying authorities in IPRsuchita74
 
Subfields of Artificial Intelligence.pptx
Subfields of Artificial Intelligence.pptxSubfields of Artificial Intelligence.pptx
Subfields of Artificial Intelligence.pptxsuchita74
 
Means End Analysis (MEA) in Artificial.pptx
Means End Analysis (MEA) in Artificial.pptxMeans End Analysis (MEA) in Artificial.pptx
Means End Analysis (MEA) in Artificial.pptxsuchita74
 
What is Fuzzy Logic in AI and applications.pptx
What is Fuzzy Logic in AI and applications.pptxWhat is Fuzzy Logic in AI and applications.pptx
What is Fuzzy Logic in AI and applications.pptxsuchita74
 
venture capital.pptx
venture capital.pptxventure capital.pptx
venture capital.pptxsuchita74
 
Knowledge-Based Agent in Artificial intelligence.pptx
Knowledge-Based Agent in Artificial intelligence.pptxKnowledge-Based Agent in Artificial intelligence.pptx
Knowledge-Based Agent in Artificial intelligence.pptxsuchita74
 
dominance of MNCs.pptx
dominance of MNCs.pptxdominance of MNCs.pptx
dominance of MNCs.pptxsuchita74
 
Rational Agent.pptx
Rational Agent.pptxRational Agent.pptx
Rational Agent.pptxsuchita74
 
5_lectureslides.pptx
5_lectureslides.pptx5_lectureslides.pptx
5_lectureslides.pptxsuchita74
 
4-220218152210.pdf
4-220218152210.pdf4-220218152210.pdf
4-220218152210.pdfsuchita74
 
factors affecting IM.pptx
factors affecting IM.pptxfactors affecting IM.pptx
factors affecting IM.pptxsuchita74
 
ALAN TURING MACHINE.pptx
ALAN TURING MACHINE.pptxALAN TURING MACHINE.pptx
ALAN TURING MACHINE.pptxsuchita74
 
SEI-CMM.pptx
SEI-CMM.pptxSEI-CMM.pptx
SEI-CMM.pptxsuchita74
 
RAD MODEL.pptx
RAD MODEL.pptxRAD MODEL.pptx
RAD MODEL.pptxsuchita74
 
ASSIGNMENT.pptx
ASSIGNMENT.pptxASSIGNMENT.pptx
ASSIGNMENT.pptxsuchita74
 

More from suchita74 (20)

Characteristics or Nature of Financial Services.pptx
Characteristics or Nature of Financial Services.pptxCharacteristics or Nature of Financial Services.pptx
Characteristics or Nature of Financial Services.pptx
 
blackboxandwhiteboxtesting in software testing.ppt
blackboxandwhiteboxtesting in software testing.pptblackboxandwhiteboxtesting in software testing.ppt
blackboxandwhiteboxtesting in software testing.ppt
 
Agile Development Models in Software EngineeringE.pptx
Agile Development Models in Software EngineeringE.pptxAgile Development Models in Software EngineeringE.pptx
Agile Development Models in Software EngineeringE.pptx
 
gantt chart & pert in Software engineering.pptx
gantt chart & pert in Software engineering.pptxgantt chart & pert in Software engineering.pptx
gantt chart & pert in Software engineering.pptx
 
ITERATIVE model in software engineering.pptx
ITERATIVE model in software engineering.pptxITERATIVE model in software engineering.pptx
ITERATIVE model in software engineering.pptx
 
The role of certifying authorities in IPR
The role of certifying authorities in IPRThe role of certifying authorities in IPR
The role of certifying authorities in IPR
 
Subfields of Artificial Intelligence.pptx
Subfields of Artificial Intelligence.pptxSubfields of Artificial Intelligence.pptx
Subfields of Artificial Intelligence.pptx
 
Means End Analysis (MEA) in Artificial.pptx
Means End Analysis (MEA) in Artificial.pptxMeans End Analysis (MEA) in Artificial.pptx
Means End Analysis (MEA) in Artificial.pptx
 
What is Fuzzy Logic in AI and applications.pptx
What is Fuzzy Logic in AI and applications.pptxWhat is Fuzzy Logic in AI and applications.pptx
What is Fuzzy Logic in AI and applications.pptx
 
venture capital.pptx
venture capital.pptxventure capital.pptx
venture capital.pptx
 
Knowledge-Based Agent in Artificial intelligence.pptx
Knowledge-Based Agent in Artificial intelligence.pptxKnowledge-Based Agent in Artificial intelligence.pptx
Knowledge-Based Agent in Artificial intelligence.pptx
 
dominance of MNCs.pptx
dominance of MNCs.pptxdominance of MNCs.pptx
dominance of MNCs.pptx
 
Rational Agent.pptx
Rational Agent.pptxRational Agent.pptx
Rational Agent.pptx
 
5_lectureslides.pptx
5_lectureslides.pptx5_lectureslides.pptx
5_lectureslides.pptx
 
4-220218152210.pdf
4-220218152210.pdf4-220218152210.pdf
4-220218152210.pdf
 
factors affecting IM.pptx
factors affecting IM.pptxfactors affecting IM.pptx
factors affecting IM.pptx
 
ALAN TURING MACHINE.pptx
ALAN TURING MACHINE.pptxALAN TURING MACHINE.pptx
ALAN TURING MACHINE.pptx
 
SEI-CMM.pptx
SEI-CMM.pptxSEI-CMM.pptx
SEI-CMM.pptx
 
RAD MODEL.pptx
RAD MODEL.pptxRAD MODEL.pptx
RAD MODEL.pptx
 
ASSIGNMENT.pptx
ASSIGNMENT.pptxASSIGNMENT.pptx
ASSIGNMENT.pptx
 

Recently uploaded

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 

Recently uploaded (20)

TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 

networking.ppt

  • 1. INTRODUCTION TO COMPUTER NETWORKS Ms. Suchita Bhovar SMT. P. N. DOSHI WOMEN’S COLLEGE BACHELOR OF COMPUTER APPLICATIONS
  • 2. Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS
  • 3. Computer Networks Computer network connects two or more autonomous computers. The computers can be geographically located anywhere. Introduction to Computer Networks
  • 4. LAN, MAN & WAN Introduction to Computer Networks Network in small geographical Area (Room, Building or a Campus) is called LAN (Local Area Network) speed (10 to 100 mbps) Network in a City is call MAN (Metropolitan Area Network) Network spread geographically (Country or across Globe) is called WAN (Wide Area Network)
  • 5. LAN (Local Area Network)
  • 7. WAN (Wide Area Network)
  • 8. Applications of Networks Introduction to Computer Networks Resource Sharing Hardware (computing resources, disks, printers) Software (application software) Information Sharing Easy accessibility from anywhere (files, databases) Search Capability (WWW) Communication Email Message broadcast Remote computing Distributed processing (GRID Computing)
  • 9. Network Topology The network topology defines the way in which computers, printers, and other devices are connected. A network topology describes the layout of the wire and devices as well as the paths used by data transmissions. Introduction to Computer Networks
  • 10. Bus Topology Commonly referred to as a linear bus, all the devices on a bus topology are connected by one single cable. Key characteristics Flexible Expandable Moderate Reliability Moderate performance Introduction to Computer Networks
  • 11. BUS TOPOLOGY • Advantages – Easy to install – Requires less cabling than mesh,star,tree,ring. • Disadvantages – Difficult to add device – Limitation on maximum number of devices linked. – Fault identification and isolation is the problem – Any fault in cable can stop the entire transmission
  • 12. Star & Tree Topology Introduction to Computer Networks The star topology is the most commonly used architecture in Ethernet LANs. When installed, the star topology resembles spokes in a bicycle wheel. Larger networks use the extended star topology also called tree topology. When used with network devices that filter frames or packets, like bridges, switches, and routers, this topology significantly reduces the traffic on the wires by sending packets only to the wires of the destination host.
  • 13. STAR & TREE TOPOLOGY ADVANTAGES • Less expensive • It is easy to install and configure • Addition and deletion involves only one connection between hub and device • It require less cabling • Fault identification and removal is easy DISADVANTAGES • If hub fails whole network goes down • There is no alternate routing • It require most cable than tree.
  • 14. Ring Topology Introduction to Computer Networks A frame travels around the ring, stopping at each node. If a node wants to transmit data, it adds the data as well as the destination address to the frame. The frame then continues around the ring until it finds the destination node, which takes the data out of the frame. Single ring – All the devices on the network share a single cable Dual ring – The dual ring topology allows data to be sent in both directions.
  • 15. RING TOPOLOGY ADVANTAGES • It is easy to install and reconfigure • Addition and deletion require only to connection • Alarm is issued if signal problem issue • Fault identification and removal is easy DISADVANTAGES • A break the ring disables the entire network. This can be removed by using dual ring or switch that closes the break.
  • 16. Mesh Topology The mesh topology connects all devices (nodes) to each other for redundancy and fault tolerance. It is used in WANs to interconnect LANs and for mission critical networks like those used by banks and financial institutions. Implementing the mesh topology is expensive and difficult. Introduction to Computer Networks
  • 17. MESH TOPOLOGY ADVANTAGES • There is no traffic problem due to dedicated point to point link. • The network is robust as if one link becomes unusable then also the network can work. • The Network is very secure as only intended receiver will get the data. • Fault identification and removal is very easy. DISADVANTAGES • Installation is difficult as every device is connected to every other devices. • Cost is very high due to more cabling and more ports for each device. • Addition and deletion is difficult as it will remove all connection.
  • 18. Network Components Introduction to Computer Networks Physical Media Interconnecting Devices Computers Networking Software Applications
  • 19. Networking Media Networking media can be defined simply as the means by which signals (data) are sent from one computer to another (either by cable or wireless means). Introduction to Computer Networks
  • 20. Networking Devices Introduction to Computer Networks HUB, Switches, Routers, Wireless Access Points, Modems etc. are required to link them together. These are called internetworking devices.
  • 22. REPEATERS • It is an electronic device that operate on only the physical layer. • Its job is to regenerate the signal over the same network before the signal becomes too weak or corrupted so as to extend the length to which the signal can be transmitted over the same network. • An important point to be noted about repeaters is that they do not amplify the signal. • When the signal becomes weak, they copy the signal bit by bit and regenerate it at the original strength. • It is a 2 port device.
  • 23. BRIDGES • A bridge operates at data link layer. A bridge is a repeater. • It is also used for interconnecting two LANs working on the same protocol. It has a single input and single output port, thus making it a 2 port device. Types of Bridges • Simple Bridge: links two segments and contains a table the list address of all the station included in each of them. • Multi Bridge: connect more than two LAN • Transport Bridge: builds table of station addresses on its own as it performs its bridge function.
  • 25. Routers • A router is a device like a switch that routes data packets based on their IP addresses. • Router is mainly a Network Layer device. • Routers normally connect LANs and WANs together and have a dynamically updating routing table based on which they make decisions on routing the data packets. • Router divide broadcast domains of hosts connected through it.
  • 26. Switches • A switch is a multiport bridge with a buffer and a design that can boost its efficiency(a large number of ports imply less traffic) and performance. • A switch is a data link layer device. • The switch can perform error checking before forwarding data, that makes it very efficient as it does not forward packets that have errors and forward good packets selectively to correct port only.
  • 27. HUB • A hub is basically a multiport repeater. • A hub connects multiple wires coming from different branches, for example, the connector in star topology which connects different stations. • Hubs cannot filter data, so data packets are sent to all connected devices. • Also, they do not have intelligence to find out best path for data packets which leads to inefficiencies and wastage.
  • 28. BANDWIDTH • Bandwidth describes the maximum data transfer rate of a network or Internet connection. • It measures how much data can be sent over a specific connection in a given amount of time. • For example, a gigabit Ethernet connection has a bandwidth of 1,000 Mbps (125 megabytes per second)
  • 30. Types of Hub • Active Hub:- – These are the hubs which have their own power supply and can clean, boost and relay the signal along with the network. – It serves both as a repeater as well as wiring centre. • These are used to extend the maximum distance between nodes. • Passive Hub :- – These are the hubs which collect wiring from nodes and power supply from active hub. – These hubs relay signals onto the network without cleaning and boosting them and can’t be used to extend the distance between nodes.
  • 31. Computers: Clients and Servers In a client/server network arrangement, network services are located in a dedicated computer whose only function is to respond to the requests of clients. The server contains the file, print, application, security, and other services in a central computer that is continuously available to respond to client requests. Introduction to Computer Networks
  • 32. TCP/IP • TCP/IP, or the Transmission Control Protocol/Internet Protocol, is a suite of communication protocols used to interconnect network devices on the internet. • TCP/IP can also be used as a communications protocol in a private network (an intranet or an extranet).
  • 33. How TCP/IP works • TCP/IP uses the client/server model of communication in which a user or machine (a client) is provided a service (like sending a webpage) by another computer (a server) in the network. • Collectively, the TCP/IP suite of protocols is classified as stateless, which means each client request is considered new because it is unrelated to previous requests. Being stateless frees up network paths so they can be used continuously. • The transport layer itself, however, is stateful. It transmits a single message, and its connection remains in place until all the packets in a message have been received and reassembled at the destination.
  • 35. Applications E-mail Searchable Data (Web Sites) E-Commerce News Groups Internet Telephony (VoIP) Video Conferencing Chat Groups Instant Messengers Internet Radio Introduction to Computer Networks