SlideShare a Scribd company logo
1 of 10
YOUSUF 10 AB
 s a telecommunications network which
allows computers to exchange data. In
computer networks, networked computing
devices pass data to each other along data
connections (network links). Data is
transferred in the form of packets. The
connections between nodes are established
using either cable media or wireless media.
The best-known computer network is
the Internet.
 devices that originate, route and terminate the
data are called network nodes.[1] Nodes can
include hosts such aspersonal
computers, phones, servers as well as networking
hardware. Two such devices are said to be
networked together when one device is able to
exchange information with the other device,
whether or not they have a direct connection to
each other.
 Computer networks differ in the transmission
media used to carry their signals,
the communications protocols to organize
network traffic, the network's size
 Computer networking may be considered a branch
of electrical engineering, telecommunications, computer
science, information technology or computer engineering,
since it relies upon the theoretical and practical
application of the related disciplines.
 A computer network facilitates interpersonal
communications allowing people to communicate
efficiently and easily via email, instant messaging, chat
rooms, telephone, video telephone calls, and video
conferencing. Providing access to information on shared
storage devices is an important feature of many networks.
A network allows sharing of files, data, and other types of
information giving authorized users the ability to access
information stored on other computers on the network. A
network allows sharing of network and computing
resources.
 Computer communication links that do not support
packets, such as traditional point-to-point
telecommunication links, simply transmit data as a bit
stream. However, most information in computer
networks is carried in packets. A network packet is a
formatted unit of data (a list of bits or bytes, usually a
few tens of bytes to a few kilobytes long) carried by
a packet-switched network.
 In packet networks, the data is formatted into packets
that are sent through the network to their destination.
Once the packets arrive they are reassembled into their
original message. With packets, the bandwidth of the
transmission medium can be better shared among
users than i
 The physical layout of a network is usually less
important than the topology that connects
network nodes. Most diagrams that describe a
physical network are therefore topological,
rather than geographic. The symbols on these
diagrams usually denote network links and
network nodes
 A local-area network (LAN) is
a computer network that spans a relatively
small area. Most LANs are confined to a single
building or group of buildings, however
 Network security[1] consists of the provisions
and policies adopted by a network
administrator to prevent and
monitor unauthorizedaccess, misuse,
modification, or denial of a computer
network and network-accessible resources.
Network security involves the authorization of
access to data in a network
 Network security starts with authenticating,
commonly with a username and a password.
Since this requires just one detail
authenticating the user name —i.e. the
password— this is sometimes termed one-
factor authentication. With two-factor
authentication, something the user 'has' is also
used (e.g. a security token or 'dongle', an ATM
card, or a mobile phone); and with three-factor
authentication, something the user 'is' is also
used (e.g. a fingerprint or retinal scan)
 Wi-Fi (or, incorrectly but commonly, WiFi) is
a local area wireless technology that allows an
electronic device to participate in computer
networking using 2.4 GHz UHF and
5 GHz SHF ISM radio bands.
 The Wi-Fi Alliance defines Wi-Fi as any "wireless
local area network" (WLAN) product based on
the Institute of Electrical and Electronics Engineers'
(IEEE) 802.11 standards".[1] However, the term "Wi-
Fi" is used in general English as a synonym for
"WLAN" since most modern WLANs are based on
these standard

More Related Content

What's hot

NETWORK COMMUNICATION TECHNOLOGY
NETWORK COMMUNICATION TECHNOLOGYNETWORK COMMUNICATION TECHNOLOGY
NETWORK COMMUNICATION TECHNOLOGYKak Yong
 
Computer networks
Computer networksComputer networks
Computer networksRohit Kori
 
Basic concept of computer network
Basic concept of computer networkBasic concept of computer network
Basic concept of computer networkkabtanxiray
 
Internet and Networking
Internet and NetworkingInternet and Networking
Internet and Networkingnhumar
 
Presentation3 network
Presentation3 networkPresentation3 network
Presentation3 networkRana Muzffar
 
Classification computer network
Classification computer networkClassification computer network
Classification computer networkMH Shihab
 
Networking online assignment
Networking online assignmentNetworking online assignment
Networking online assignmentKavitha Dhanesh
 
Computer networks
Computer networksComputer networks
Computer networksUsman Abid
 
NETWORK,INTERNET & WWW ppt
NETWORK,INTERNET & WWW pptNETWORK,INTERNET & WWW ppt
NETWORK,INTERNET & WWW pptNalinSinha3
 
Computer Network Power Point
Computer Network Power PointComputer Network Power Point
Computer Network Power PointKaptainz12
 

What's hot (20)

NETWORK COMMUNICATION TECHNOLOGY
NETWORK COMMUNICATION TECHNOLOGYNETWORK COMMUNICATION TECHNOLOGY
NETWORK COMMUNICATION TECHNOLOGY
 
Computer network
Computer network Computer network
Computer network
 
Computer communication
Computer communicationComputer communication
Computer communication
 
Computer networks
Computer networksComputer networks
Computer networks
 
Basic concept of computer network
Basic concept of computer networkBasic concept of computer network
Basic concept of computer network
 
Internet and Networking
Internet and NetworkingInternet and Networking
Internet and Networking
 
Presentation3 network
Presentation3 networkPresentation3 network
Presentation3 network
 
Network Summary
Network SummaryNetwork Summary
Network Summary
 
Ecommerce Chap 07
Ecommerce Chap 07Ecommerce Chap 07
Ecommerce Chap 07
 
Introduction to Internet
Introduction to Internet Introduction to Internet
Introduction to Internet
 
Classification computer network
Classification computer networkClassification computer network
Classification computer network
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Networking online assignment
Networking online assignmentNetworking online assignment
Networking online assignment
 
network
networknetwork
network
 
Computer network
Computer networkComputer network
Computer network
 
Computer networks
Computer networksComputer networks
Computer networks
 
NETWORK,INTERNET & WWW ppt
NETWORK,INTERNET & WWW pptNETWORK,INTERNET & WWW ppt
NETWORK,INTERNET & WWW ppt
 
Types of network
Types of networkTypes of network
Types of network
 
Networks
NetworksNetworks
Networks
 
Computer Network Power Point
Computer Network Power PointComputer Network Power Point
Computer Network Power Point
 

Viewers also liked

Monumento antiguo que aun prevalece en sinaloa
Monumento antiguo que aun prevalece en sinaloaMonumento antiguo que aun prevalece en sinaloa
Monumento antiguo que aun prevalece en sinaloaBianka Luna
 
Double slit interference
Double slit interferenceDouble slit interference
Double slit interferenceIan Whey
 
Power and intensity
Power and intensityPower and intensity
Power and intensityIan Whey
 
10 rad dotyczących content marketingu / prowca
10 rad dotyczących content marketingu / prowca10 rad dotyczących content marketingu / prowca
10 rad dotyczących content marketingu / prowcaPRowca
 
10 PRZYKŁADÓW NA KREATYWNE OPAKOWANIA PRODUKTÓW / prowca
10 PRZYKŁADÓW NA KREATYWNE OPAKOWANIA PRODUKTÓW / prowca10 PRZYKŁADÓW NA KREATYWNE OPAKOWANIA PRODUKTÓW / prowca
10 PRZYKŁADÓW NA KREATYWNE OPAKOWANIA PRODUKTÓW / prowcaPRowca
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentationlifeingrace
 
20 pomysłów na content social media lub bloga / personal branding / prowca
20 pomysłów na content social media lub bloga / personal branding / prowca20 pomysłów na content social media lub bloga / personal branding / prowca
20 pomysłów na content social media lub bloga / personal branding / prowcaPRowca
 
Altius, Inc_Overview
Altius, Inc_OverviewAltius, Inc_Overview
Altius, Inc_OverviewAltius
 
The use of Social Media in Banking
The use of Social Media in BankingThe use of Social Media in Banking
The use of Social Media in BankingMajid Heidari
 
Health Plan Week 10-27-14
Health Plan Week 10-27-14Health Plan Week 10-27-14
Health Plan Week 10-27-14Daniel Tedesco
 

Viewers also liked (12)

Monumento antiguo que aun prevalece en sinaloa
Monumento antiguo que aun prevalece en sinaloaMonumento antiguo que aun prevalece en sinaloa
Monumento antiguo que aun prevalece en sinaloa
 
Double slit interference
Double slit interferenceDouble slit interference
Double slit interference
 
Power and intensity
Power and intensityPower and intensity
Power and intensity
 
10 rad dotyczących content marketingu / prowca
10 rad dotyczących content marketingu / prowca10 rad dotyczących content marketingu / prowca
10 rad dotyczących content marketingu / prowca
 
10 PRZYKŁADÓW NA KREATYWNE OPAKOWANIA PRODUKTÓW / prowca
10 PRZYKŁADÓW NA KREATYWNE OPAKOWANIA PRODUKTÓW / prowca10 PRZYKŁADÓW NA KREATYWNE OPAKOWANIA PRODUKTÓW / prowca
10 PRZYKŁADÓW NA KREATYWNE OPAKOWANIA PRODUKTÓW / prowca
 
31.1.17
31.1.1731.1.17
31.1.17
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
20 pomysłów na content social media lub bloga / personal branding / prowca
20 pomysłów na content social media lub bloga / personal branding / prowca20 pomysłów na content social media lub bloga / personal branding / prowca
20 pomysłów na content social media lub bloga / personal branding / prowca
 
Altius, Inc_Overview
Altius, Inc_OverviewAltius, Inc_Overview
Altius, Inc_Overview
 
THE HISTORY OF MITHILA
THE HISTORY OF MITHILATHE HISTORY OF MITHILA
THE HISTORY OF MITHILA
 
The use of Social Media in Banking
The use of Social Media in BankingThe use of Social Media in Banking
The use of Social Media in Banking
 
Health Plan Week 10-27-14
Health Plan Week 10-27-14Health Plan Week 10-27-14
Health Plan Week 10-27-14
 

Similar to Computer network

Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)saurabh goel
 
Computer network
Computer networkComputer network
Computer networkRohit Gupta
 
Class viii ch-1 networking concepts
Class  viii ch-1 networking conceptsClass  viii ch-1 networking concepts
Class viii ch-1 networking conceptsjessandy
 
Book1 class 8.pptx of networking concepts.pptx
Book1 class 8.pptx of networking concepts.pptxBook1 class 8.pptx of networking concepts.pptx
Book1 class 8.pptx of networking concepts.pptxnutanm610
 
computer networking by ashba fatima
computer networking by ashba fatimacomputer networking by ashba fatima
computer networking by ashba fatimaAshbaFatima1
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKINGRozinaMemon1
 
Bab3-computer network
Bab3-computer networkBab3-computer network
Bab3-computer networkAten Kecik
 
Network Fundamentals1.pptx
Network Fundamentals1.pptxNetwork Fundamentals1.pptx
Network Fundamentals1.pptxsairakesh41
 
7312334 chapter-7 a-networking-basics
7312334 chapter-7 a-networking-basics7312334 chapter-7 a-networking-basics
7312334 chapter-7 a-networking-basicsfasywan
 
Introduction of computer networks
Introduction of computer networksIntroduction of computer networks
Introduction of computer networksAlidHasan4
 
Dcn(data communication and computer network)
Dcn(data communication and computer network)Dcn(data communication and computer network)
Dcn(data communication and computer network)Ramakrishna kapa
 
Computer network unit 1 notes
Computer network unit  1 notesComputer network unit  1 notes
Computer network unit 1 notesRavi Rajput
 

Similar to Computer network (20)

Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)
 
Computer network
Computer networkComputer network
Computer network
 
Class viii ch-1 networking concepts
Class  viii ch-1 networking conceptsClass  viii ch-1 networking concepts
Class viii ch-1 networking concepts
 
Book1 class 8.pptx of networking concepts.pptx
Book1 class 8.pptx of networking concepts.pptxBook1 class 8.pptx of networking concepts.pptx
Book1 class 8.pptx of networking concepts.pptx
 
computer networking by ashba fatima
computer networking by ashba fatimacomputer networking by ashba fatima
computer networking by ashba fatima
 
Chapter 6.0
Chapter 6.0Chapter 6.0
Chapter 6.0
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 
Computer Network - Unit 1
Computer Network - Unit 1Computer Network - Unit 1
Computer Network - Unit 1
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
A computer network
A computer networkA computer network
A computer network
 
Bab3-computer network
Bab3-computer networkBab3-computer network
Bab3-computer network
 
Network Fundamentals1.pptx
Network Fundamentals1.pptxNetwork Fundamentals1.pptx
Network Fundamentals1.pptx
 
Computer networks
Computer networksComputer networks
Computer networks
 
7312334 chapter-7 a-networking-basics
7312334 chapter-7 a-networking-basics7312334 chapter-7 a-networking-basics
7312334 chapter-7 a-networking-basics
 
Networking
NetworkingNetworking
Networking
 
Introduction of computer networks
Introduction of computer networksIntroduction of computer networks
Introduction of computer networks
 
Dcn(data communication and computer network)
Dcn(data communication and computer network)Dcn(data communication and computer network)
Dcn(data communication and computer network)
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Computer network
Computer networkComputer network
Computer network
 
Computer network unit 1 notes
Computer network unit  1 notesComputer network unit  1 notes
Computer network unit 1 notes
 

Recently uploaded

Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaWSO2
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...caitlingebhard1
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....rightmanforbloodline
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingWSO2
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceIES VE
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseWSO2
 

Recently uploaded (20)

Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 

Computer network

  • 2.  s a telecommunications network which allows computers to exchange data. In computer networks, networked computing devices pass data to each other along data connections (network links). Data is transferred in the form of packets. The connections between nodes are established using either cable media or wireless media. The best-known computer network is the Internet.
  • 3.  devices that originate, route and terminate the data are called network nodes.[1] Nodes can include hosts such aspersonal computers, phones, servers as well as networking hardware. Two such devices are said to be networked together when one device is able to exchange information with the other device, whether or not they have a direct connection to each other.  Computer networks differ in the transmission media used to carry their signals, the communications protocols to organize network traffic, the network's size
  • 4.  Computer networking may be considered a branch of electrical engineering, telecommunications, computer science, information technology or computer engineering, since it relies upon the theoretical and practical application of the related disciplines.  A computer network facilitates interpersonal communications allowing people to communicate efficiently and easily via email, instant messaging, chat rooms, telephone, video telephone calls, and video conferencing. Providing access to information on shared storage devices is an important feature of many networks. A network allows sharing of files, data, and other types of information giving authorized users the ability to access information stored on other computers on the network. A network allows sharing of network and computing resources.
  • 5.  Computer communication links that do not support packets, such as traditional point-to-point telecommunication links, simply transmit data as a bit stream. However, most information in computer networks is carried in packets. A network packet is a formatted unit of data (a list of bits or bytes, usually a few tens of bytes to a few kilobytes long) carried by a packet-switched network.  In packet networks, the data is formatted into packets that are sent through the network to their destination. Once the packets arrive they are reassembled into their original message. With packets, the bandwidth of the transmission medium can be better shared among users than i
  • 6.  The physical layout of a network is usually less important than the topology that connects network nodes. Most diagrams that describe a physical network are therefore topological, rather than geographic. The symbols on these diagrams usually denote network links and network nodes
  • 7.  A local-area network (LAN) is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings, however
  • 8.  Network security[1] consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorizedaccess, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network
  • 9.  Network security starts with authenticating, commonly with a username and a password. Since this requires just one detail authenticating the user name —i.e. the password— this is sometimes termed one- factor authentication. With two-factor authentication, something the user 'has' is also used (e.g. a security token or 'dongle', an ATM card, or a mobile phone); and with three-factor authentication, something the user 'is' is also used (e.g. a fingerprint or retinal scan)
  • 10.  Wi-Fi (or, incorrectly but commonly, WiFi) is a local area wireless technology that allows an electronic device to participate in computer networking using 2.4 GHz UHF and 5 GHz SHF ISM radio bands.  The Wi-Fi Alliance defines Wi-Fi as any "wireless local area network" (WLAN) product based on the Institute of Electrical and Electronics Engineers' (IEEE) 802.11 standards".[1] However, the term "Wi- Fi" is used in general English as a synonym for "WLAN" since most modern WLANs are based on these standard