SlideShare a Scribd company logo
1 of 30
Wajeeha
Sagheer
BS(IT)
1st Semester
Assigned Topic:
Types of NETWORKS
Presented by
What is Network
Collection of computers and devices connected via
communications devices and transmission is called network.
media
Types of Network
 LAN
 MAN
 WAN
 PAN
 VPN
 HAN
 Peer-to-peer
 Client to server
LAN:
A local area network (LAN) is a computer network that
interconnects computers within a limited area such as a residence,
school, laboratory, university campus or office building and has its
network equipment and interconnects locally managed.
Examples:
 Ethernet and Wi-Fi
 Networking in home, office.
 Networking between two computers.
 Wi-Fi (When we consider wireless LAN)
1. Resource Sharing
2. Software Applications Sharing
3. Easy and Cheap Communication
4. Data Security
5. Internet Sharing
1. Privacy Violations
2.Data Security Threat
3. Covers Limited Area
4. LAN Maintenance Job
5. High Setup Cost
MAN:
A Metropolitan area network (MAN) is a network that
interconnects users with computer resources in a geographic area
or region larger than that covered by even a large local area
network (LAN) but smaller than the area covered by a wide area
network (WAN).
Examples:
Metropolitan area networks of various sizes can be found
in the metropolitan areas of London, England; Lodz, Poland; and
Geneva, Switzerland. Large universities also sometimes use the
term to describe their networks.
1.It provides good back bone or
large network and provide grater
access than wans.
2. The man usually encompasses several
blokes of city or an entire city.
1. More cables required for man connection
from one place to another .
2. It is difficult to make the system
secure form hackers and industrial
espionages
WAN:
A wide area network (WAN) is a
geographically distributed private
telecommunications network that interconnects multiple
local area networks (LANs). In an enterprise, a WAN may
consist of connections to a company's headquarters, branch
offices, colocation facilities, cloud services and other
facilities.
Types Of WAN connections:
 WAN technologies, based on the 4G LTE standard, are gaining
traction
 Public Wi Fi or satellite networks.
 WAN infrastructure may be privately owned or leased as a
service from a third-party service provider, such as
a telecommunication carrier, internet service provider, private
IP network operator or cable company.
Example
Internet is the example of WAN.
1. Covers a large geographical area
so long businesses can connect on
the one network .
2. Everyone on the network can use
the same data .This avoid the
problem where same user may have
older information.
3.Massage sent and receive
(audio,vedio,images, text) best e.g.
Skype, Whatsapp.
1. Need a good firewall to restricted for
outsiders from entering disturbing the
network .
2. Security is real issue most of people
hacker and made viruses to their PCs
and stole the important files.
Example:
The good example of personal area network is
Bluetooth.
1. Every information which are stored in
the devices which are shared via network
with authorized peoples only. So there is
secure file transfer between device
2. This is the basic concept for wearable
computing.It gives royal look and which
makes work simple.
3.It is use in portable devices such as
PDAs.
1. in this lot mostly devices are used for
communication. wireless uses microwave
signals as medium for make
communication path.
2 Long time working with this radius
signals will leads some brain related
problems, and heart related problems
3. This network uses devices which are
may expensive such as
smartphones,laptops,Digi camera, PDA...
etc.
VPN:
A virtual private network (VPN) is a technology that
creates an encrypted connection over a less secure network.
The benefit of using a secure VPN is it ensures the
appropriate level of security to the connected systems when
the underlying network infrastructure alone cannot provide
it. The justification for using VPN access instead of a
private network usually boils down to cost and feasibility:
It is either not feasible to have a private network
Examples:
The instructions are send from head office to the
regional offices through internet
Examples:
( Image, HTML, PDF file, MS PowerPoint
Presentation, Adobe Flash or MS Visio
XML
Peer to Peer :
Simple network that connects fewer than 10
computers each computer, or peer, has equal capabilities.
Examples:
If User A's PC is connected to a printer that
User B wants to access, User A must set his machine to
allow (share) access to the printer. Similarly, if User B
wants to have access to a folder or file, or even a complete
hard drive, on User A's PC, User A must enable file sharing
on his PC. Access to folders and printers on an office P2P
network can be further controlled by assigning passwords
to those resources.
1. Cheaper cabling cost.
2 .Normally used in small networks
with less than10 computers.
3.No server need.
1. All computer have equal ability.
2. Hard to manage.
3.Install to every computer.
Client to server:
One or more computers act as server
and other computers, or clients, access server is called
client to server network.
Example:
In lab there are one server computer and many
client computers.
In companies.
In education departments.
1.Server has control ability while
client’s don’t.
2. It is used in small and large area
networks.
3. Easy to manage.
4.Install software only in the server
computer while client’s share the
software.
1.Higher cabling cost
2.One powerful computer acting as
server.
Reference:
www.definition.com
www.conceptdraw.com
study.com
www.lifewire.com
www.googl.com
http://hitechtube.blogspot.com/
www.google.com.pk
www.google.com.pk

More Related Content

What's hot (20)

FUNDAMENTAL OF NETWORK
FUNDAMENTAL OF NETWORKFUNDAMENTAL OF NETWORK
FUNDAMENTAL OF NETWORK
 
Internet vs intranet vs extranet
Internet vs intranet vs extranetInternet vs intranet vs extranet
Internet vs intranet vs extranet
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocol
 
Types of network
Types of networkTypes of network
Types of network
 
Internet, intranet and extranet
Internet, intranet and extranetInternet, intranet and extranet
Internet, intranet and extranet
 
Classification of Computer Network
Classification of Computer NetworkClassification of Computer Network
Classification of Computer Network
 
3.1 Network Basic
3.1 Network Basic3.1 Network Basic
3.1 Network Basic
 
Seminar report-networking
Seminar report-networkingSeminar report-networking
Seminar report-networking
 
Network resources
Network resourcesNetwork resources
Network resources
 
Basic concept of Computer networks
Basic concept of Computer networks Basic concept of Computer networks
Basic concept of Computer networks
 
Internet and Networking
Internet and NetworkingInternet and Networking
Internet and Networking
 
Networks
NetworksNetworks
Networks
 
Computer network
Computer networkComputer network
Computer network
 
Computer network 1
Computer network 1Computer network 1
Computer network 1
 
Computer Networking Basic
Computer Networking BasicComputer Networking Basic
Computer Networking Basic
 
Dotson - Network Tutorial
Dotson - Network TutorialDotson - Network Tutorial
Dotson - Network Tutorial
 
Networks
NetworksNetworks
Networks
 
Computer network
Computer networkComputer network
Computer network
 
NETWORK INTERNET and TYPES OF NETWORK
NETWORK INTERNET and TYPES OF NETWORKNETWORK INTERNET and TYPES OF NETWORK
NETWORK INTERNET and TYPES OF NETWORK
 
NETWORK,INTERNET & WWW ppt
NETWORK,INTERNET & WWW pptNETWORK,INTERNET & WWW ppt
NETWORK,INTERNET & WWW ppt
 

Similar to network

Types of Computer Networks
Types of Computer NetworksTypes of Computer Networks
Types of Computer NetworksRaja Adapa
 
Classification of Computer Networks
Classification of Computer NetworksClassification of Computer Networks
Classification of Computer NetworksMostafizurRahmanMonn
 
Types of Computer Networks bba 1st sem.pptx
Types of Computer Networks bba 1st sem.pptxTypes of Computer Networks bba 1st sem.pptx
Types of Computer Networks bba 1st sem.pptxPankaj Chandel
 
Computer networks short note (version 8)
Computer networks short note (version 8)Computer networks short note (version 8)
Computer networks short note (version 8)Nimmi Weeraddana
 
Basic-Concepts-in-Computer-Networks.pptx
Basic-Concepts-in-Computer-Networks.pptxBasic-Concepts-in-Computer-Networks.pptx
Basic-Concepts-in-Computer-Networks.pptxDepEd-Bataan
 
A seminar on networks and networking
A seminar on networks and networkingA seminar on networks and networking
A seminar on networks and networkingNAGASHREE C
 
Class viii ch-1 networking concepts
Class  viii ch-1 networking conceptsClass  viii ch-1 networking concepts
Class viii ch-1 networking conceptsjessandy
 
computer networks
computer networks computer networks
computer networks MiXvideos
 
Type of computer network
Type of computer networkType of computer network
Type of computer networkTapashRoy16
 
Chapter 2 - Types of Computer Networks-converted e.pptx
Chapter 2 - Types of Computer Networks-converted e.pptxChapter 2 - Types of Computer Networks-converted e.pptx
Chapter 2 - Types of Computer Networks-converted e.pptxtahaniali27
 
Data Communication & Network
Data Communication & NetworkData Communication & Network
Data Communication & NetworkMaulen Bale
 
Computer Network its application & network types
Computer Network its application & network typesComputer Network its application & network types
Computer Network its application & network typesMolayChakraBorty
 
Internet, Intranet and Extranet presentation
Internet, Intranet and Extranet presentationInternet, Intranet and Extranet presentation
Internet, Intranet and Extranet presentationGambari Amosa Isiaka
 

Similar to network (20)

final IT ppt.pptx
final IT ppt.pptxfinal IT ppt.pptx
final IT ppt.pptx
 
Types of Computer Networks
Types of Computer NetworksTypes of Computer Networks
Types of Computer Networks
 
Classification of Computer Networks
Classification of Computer NetworksClassification of Computer Networks
Classification of Computer Networks
 
Types of Computer Networks bba 1st sem.pptx
Types of Computer Networks bba 1st sem.pptxTypes of Computer Networks bba 1st sem.pptx
Types of Computer Networks bba 1st sem.pptx
 
Computer networks short note (version 8)
Computer networks short note (version 8)Computer networks short note (version 8)
Computer networks short note (version 8)
 
Basic-Concepts-in-Computer-Networks.pptx
Basic-Concepts-in-Computer-Networks.pptxBasic-Concepts-in-Computer-Networks.pptx
Basic-Concepts-in-Computer-Networks.pptx
 
A seminar on networks and networking
A seminar on networks and networkingA seminar on networks and networking
A seminar on networks and networking
 
Lecture 01 networking
Lecture 01 networkingLecture 01 networking
Lecture 01 networking
 
Class viii ch-1 networking concepts
Class  viii ch-1 networking conceptsClass  viii ch-1 networking concepts
Class viii ch-1 networking concepts
 
Computer networks
Computer networksComputer networks
Computer networks
 
computer networks
computer networks computer networks
computer networks
 
Type of computer network
Type of computer networkType of computer network
Type of computer network
 
City university
City universityCity university
City university
 
Hardware1
Hardware1Hardware1
Hardware1
 
Hardware1
Hardware1Hardware1
Hardware1
 
Chapter 2 - Types of Computer Networks-converted e.pptx
Chapter 2 - Types of Computer Networks-converted e.pptxChapter 2 - Types of Computer Networks-converted e.pptx
Chapter 2 - Types of Computer Networks-converted e.pptx
 
Data Communication & Network
Data Communication & NetworkData Communication & Network
Data Communication & Network
 
Computer Network its application & network types
Computer Network its application & network typesComputer Network its application & network types
Computer Network its application & network types
 
Internet, Intranet and Extranet presentation
Internet, Intranet and Extranet presentationInternet, Intranet and Extranet presentation
Internet, Intranet and Extranet presentation
 
Wireless and intranet
Wireless and intranetWireless and intranet
Wireless and intranet
 

Recently uploaded

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 

Recently uploaded (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 

network

  • 1.
  • 2.
  • 3.
  • 5. What is Network Collection of computers and devices connected via communications devices and transmission is called network. media
  • 6. Types of Network  LAN  MAN  WAN  PAN  VPN  HAN  Peer-to-peer  Client to server
  • 7. LAN: A local area network (LAN) is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building and has its network equipment and interconnects locally managed.
  • 8. Examples:  Ethernet and Wi-Fi  Networking in home, office.  Networking between two computers.  Wi-Fi (When we consider wireless LAN)
  • 9. 1. Resource Sharing 2. Software Applications Sharing 3. Easy and Cheap Communication 4. Data Security 5. Internet Sharing 1. Privacy Violations 2.Data Security Threat 3. Covers Limited Area 4. LAN Maintenance Job 5. High Setup Cost
  • 10. MAN: A Metropolitan area network (MAN) is a network that interconnects users with computer resources in a geographic area or region larger than that covered by even a large local area network (LAN) but smaller than the area covered by a wide area network (WAN).
  • 11. Examples: Metropolitan area networks of various sizes can be found in the metropolitan areas of London, England; Lodz, Poland; and Geneva, Switzerland. Large universities also sometimes use the term to describe their networks.
  • 12. 1.It provides good back bone or large network and provide grater access than wans. 2. The man usually encompasses several blokes of city or an entire city. 1. More cables required for man connection from one place to another . 2. It is difficult to make the system secure form hackers and industrial espionages
  • 13. WAN: A wide area network (WAN) is a geographically distributed private telecommunications network that interconnects multiple local area networks (LANs). In an enterprise, a WAN may consist of connections to a company's headquarters, branch offices, colocation facilities, cloud services and other facilities.
  • 14. Types Of WAN connections:  WAN technologies, based on the 4G LTE standard, are gaining traction  Public Wi Fi or satellite networks.  WAN infrastructure may be privately owned or leased as a service from a third-party service provider, such as a telecommunication carrier, internet service provider, private IP network operator or cable company.
  • 15. Example Internet is the example of WAN.
  • 16. 1. Covers a large geographical area so long businesses can connect on the one network . 2. Everyone on the network can use the same data .This avoid the problem where same user may have older information. 3.Massage sent and receive (audio,vedio,images, text) best e.g. Skype, Whatsapp. 1. Need a good firewall to restricted for outsiders from entering disturbing the network . 2. Security is real issue most of people hacker and made viruses to their PCs and stole the important files.
  • 17. Example: The good example of personal area network is Bluetooth.
  • 18. 1. Every information which are stored in the devices which are shared via network with authorized peoples only. So there is secure file transfer between device 2. This is the basic concept for wearable computing.It gives royal look and which makes work simple. 3.It is use in portable devices such as PDAs. 1. in this lot mostly devices are used for communication. wireless uses microwave signals as medium for make communication path. 2 Long time working with this radius signals will leads some brain related problems, and heart related problems 3. This network uses devices which are may expensive such as smartphones,laptops,Digi camera, PDA... etc.
  • 19. VPN: A virtual private network (VPN) is a technology that creates an encrypted connection over a less secure network. The benefit of using a secure VPN is it ensures the appropriate level of security to the connected systems when the underlying network infrastructure alone cannot provide it. The justification for using VPN access instead of a private network usually boils down to cost and feasibility: It is either not feasible to have a private network
  • 20. Examples: The instructions are send from head office to the regional offices through internet
  • 21. Examples: ( Image, HTML, PDF file, MS PowerPoint Presentation, Adobe Flash or MS Visio XML
  • 22. Peer to Peer : Simple network that connects fewer than 10 computers each computer, or peer, has equal capabilities.
  • 23. Examples: If User A's PC is connected to a printer that User B wants to access, User A must set his machine to allow (share) access to the printer. Similarly, if User B wants to have access to a folder or file, or even a complete hard drive, on User A's PC, User A must enable file sharing on his PC. Access to folders and printers on an office P2P network can be further controlled by assigning passwords to those resources.
  • 24. 1. Cheaper cabling cost. 2 .Normally used in small networks with less than10 computers. 3.No server need. 1. All computer have equal ability. 2. Hard to manage. 3.Install to every computer.
  • 25. Client to server: One or more computers act as server and other computers, or clients, access server is called client to server network.
  • 26. Example: In lab there are one server computer and many client computers. In companies. In education departments.
  • 27. 1.Server has control ability while client’s don’t. 2. It is used in small and large area networks. 3. Easy to manage. 4.Install software only in the server computer while client’s share the software. 1.Higher cabling cost 2.One powerful computer acting as server.