SlideShare a Scribd company logo
1 of 43
Networks
Networks
A network is a collection of computers and
devices connected together via communication
devices and transmission media.
LAN
A local area network (LAN) is a network that
connects computers and devices in a limited
geographical area such as a home, school
computer laboratory, office building or closely
positioned group of buildings.
Advantages
Advantages
• Speed
Sharing within networks is very rapid and can save time.
• Cost
Site-licensed (shared) versions are available at considerable savings.
Programs stored on a network’s server allow for easy upgrading.
• Security
Sensitive files and programs on a network are easily password-protected.
• Peripheral equipment sharing
Resources such as printers, modems can be shared.
• Electronic mail
• Centralised software management
Greatly reduces the need to spend time and energy installing updates and
tracking files on independent computers throughout the building.
• Workgroup computing
Workgroup software allows many users to work on a document or project
concurrently
Disadvantages of networking
Disadvantages of networking
• The cabling, network cards, file servers, etc that are
required to set up a network are expensive.
• If a server fails the entire network may stop operating.
• Viruses can spread from one computer to another over
a network.
• Decisions on resource planning tend to become
centralised.
• Networks that have grown with little thought or
appropriate planning can be inefficient in the long
term.
• As traffic increases on a network, performance declines
unless it is properly designed.
Network Architectures
Client/Server
Client/Server
On a client/server network,
one or more computers act
as a server, and the other
computers on the network
request services from the
server. The other computers
and mobile devices on the
network are referred to as
clients.
Peer-to-Peer
Peer-to-Peer
Peer-to peer network is a simple inexpensive
network that typically connects fewer than 10
computers. Each computer called a peer, has
equal responsibilities and capabilities, sharing
hardware (such as a printer), data etc.
Network Topologies
A network topology refers to the layout of the
computers and devices in a communications
network. Three commonly used network
topologies are bus, ring and star. Networks
usually use combinations of bus and star
topologies.
Bus Network
Bus Network
A bus network consists of a single central cable, to which all
computers and other devices (nodes) connect. The bus is the
physical cable that connects the computers and other devices.
It transmits data, instructions, and information in both
directions. When a sending device transmits data, the address
of the receiving device is included with the transmission so
the data is routed to the appropriate receiving device.
Bus Network
Bus networks are popular on LANs because they are
inexpensive and easy to install. Computers and other
devices can be attached and detached at any point on the
bus without disturbing the rest of the network. The main
disadvantage is the limit in size of the bus.
Star Network
Star Network
On a star network, all of the computers and
devices (nodes) on the network connect to a
central device, thus forming a star. Two types of
device that provide a common central
connection point on the network are a hub and
a switch.
Star Network
• Star networks are fairly easy to install and
maintain. Nodes can be added and removed
from the network no disruption to the
network.
Star Network
If one node fails, only that node is affected. If
the hub/switch fails the entire network is
inoperable. Most star networks consist of
multiple switches though and in that case only
the part of the network connected to that
switch will fail
Network Communication Standards
A network standard defines
guidelines that specify the way
computers access a network,
the types of medium used, the
speeds used and the type/s of
physical cable and/or wireless
technology used. A standard
that outlines how two network
devices communicate is called a
protocol.
Ethernet
Ethernet
• Ethernet is the most popular network
standard for LANs because it is relatively
inexpensive and easy to install and maintain.
• Ethernet is based on the bus topology, but
Ethernet networks can wired in a star pattern.
Ethernet 802.3
• The Ethernet (IEEE 802.3) standard for Local Area Networks (LANs). The
802.3 standard (also called Twisted Pair Ethernet) uses a twisted-pair cable
for distances up to 100m.
• 10Base-T - operates at 10 Mbps - uses a twisted-pair cable with maximum
lengths of 100 meters.
• 100Base-T – operates at 100 Mbps – often referred to as fast internet –
can use – two or four paris of twisted wires or fibre optic cables.
• 1000Base-T – operates 1Gb/s – CAT-5 cabling
• 10GbE – operates 10Gb/s – copper (CAT6a or better) or fibre cabling
WiFi
WiFi
A wireless network uses radio waves, just like cell phones, televisions
and radios do. In fact, communication across a wireless network is a lot
like two-way radio communication. Here's what happens:
1. A computer's wireless adapter translates data into a radio signal
and transmits it using an antenna.
2. A wireless router receives the signal and decodes it. The router
sends the information to the Internet using a physical, wired
Ethernet connection.
802.11
• IEEE 802.11 is a set of standards for implementing wireless local
area network (WLAN) computer.
Building a Wireless Network
1. A port to connect to your cable or DSL
modem
2. A router
3. An Ethernet hub
4. A firewall
5. A wireless access point
Bluetooth
Bluetooth
Bluetooth takes small-area networking to the
next level by removing the need for user
intervention and keeping transmission power
extremely low to save battery power.
The big draws of Bluetooth are that it is wireless,
inexpensive and automatic.
Wireless Security
WiFi Protected Access (WPA) is
now part of the 802.11i wireless
network security protocol. It uses
encryption and involves signing on
with a password. Most public
hotspots are either open or use
WPA or 128-bit WEP technology
(Wired Equivalency Privacy – an
older form of security)
Wireless Application Protocol
• Wireless Application
Protocol (WAP) is a
technical standard for
accessing information
over a mobile (phone)
wireless network. A
WAP browser is a web
browser for mobile
devices such as mobile
phones that uses the
protocol.
TCP/IP
TCP/IP
Transmission Control Protocol/Internet Protocol, TCP/IP is
a network standard, that defines how data is routed from
one end of a network to the other end, ensuring the data
arrives correctly. It describes rules for;
• dividing data into small pieces, called packets
• providing addresses for each packet,
• checking for and detection of errors,
• sequencing packets and,
• regulating the flow of messages along the network
TCP/IP has been adopted as a network standard for
Internet communications.
Short for HyperText Transfer Protocol, HTTP is
the underlying protocol used by the World Wide
Web. HTTP defines how messages are formatted
and transmitted, and what actions Web servers
and browsers should take in response to various
commands.
HTTPS is a communications protocol for secure
communication over a computer network, with especially
wide deployment on the Internet.
Historically, HTTPS connections were primarily used for
payment transactions on the World Wide Web, e-mail
and for sensitive transactions in corporate information
systems. In the late 2000s and early 2010s, HTTPS began
to see widespread use for protecting page authenticity on
all types of websites, securing accounts and keeping user
communications, identity and web browsing private.
Routers, Packets, Switches, Hubs, and
Firewalls
Routers
When you send e-mail to a friend on the other side of the
country, how does the message know to end up on your
friend's computer, rather than on one of the millions of other
computers in the world? Much of the work to get a message
from one computer to another is done by routers, because
they're the crucial devices that let messages flow between
networks, rather than within networks.
Packets
Internet data, whether in the form of a
Web page, a downloaded file or an e-mail
message, travels over a system known as a
packet-switching network. In this system,
the data in a message or file is broken up
into packets about 1,500 bytes long. Each
of these packets includes information on
the sender's address, the receiver's
address, the packet’s place in the entire
message, and how the receiving computer
can be sure that the packet arrived intact.
NIC
• Network Interface Card (NIC), an expansion
board you insert into a computer so the
computer can be connected to a network.
• These days this functionality is already built
into the motherboard and so a NIC is not
needed.
Modem
• Short for MOdulator-DEModulator. A modem is
a device or program that enables a computer to
connect to the internet or simply transmit data
over, for example, telephone or cable lines. Ye
olden modems converted from analogue to
digital and back again but modern modems do
not need to do this anymore.
Switch
• Switches allow different nodes (a
network connection point, typically
a computer) of a network to
communicate directly with one
another in a smooth and efficient
manner.
• Essentially, a LAN switch creates a
series of instant networks that
contain only the two devices
communicating with each other at
that particular moment.
Firewall
• A firewall is simply a program or hardware
device that filters the information coming
through the Internet connection into your
private network or computer system.
More Hardware Stuff
• DSL Modem
• Hotspt (Wifi)
• Network Interface Card
• Ethernet Cabling
• Fibre Optic Cable

More Related Content

What's hot

Types of computer networks
Types of computer networksTypes of computer networks
Types of computer networksTatheer Fatima
 
Computer Network
Computer NetworkComputer Network
Computer NetworkCma Mohd
 
3 computer network - basic concepts
3   computer network - basic concepts3   computer network - basic concepts
3 computer network - basic conceptsAnkit Garg
 
Computer network
Computer networkComputer network
Computer networkAbdul Wahab
 
Asynchronous transfer mode
Asynchronous transfer modeAsynchronous transfer mode
Asynchronous transfer modeVinil Patel
 
Computer networking
Computer networkingComputer networking
Computer networkingAbdul Rehman
 
Cellular communication
Cellular communicationCellular communication
Cellular communicationRahul Pandey
 
Computer network & communication answer
Computer network & communication answerComputer network & communication answer
Computer network & communication answersmkengkilili2011
 
issues in desigining routing protocols
 issues in desigining routing protocols issues in desigining routing protocols
issues in desigining routing protocolsPradeep Kumar TS
 
Setting up a home network
Setting up a home networkSetting up a home network
Setting up a home networkclcewing
 
basic networking
basic networkingbasic networking
basic networkingAnmol Bagga
 

What's hot (20)

Ethernet
EthernetEthernet
Ethernet
 
Wide Area Network (WAN)
Wide Area Network (WAN)Wide Area Network (WAN)
Wide Area Network (WAN)
 
Types of computer networks
Types of computer networksTypes of computer networks
Types of computer networks
 
Wifi wimax
Wifi wimaxWifi wimax
Wifi wimax
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Networkingconcepts
NetworkingconceptsNetworkingconcepts
Networkingconcepts
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
3 computer network - basic concepts
3   computer network - basic concepts3   computer network - basic concepts
3 computer network - basic concepts
 
Computer network
Computer networkComputer network
Computer network
 
Asynchronous transfer mode
Asynchronous transfer modeAsynchronous transfer mode
Asynchronous transfer mode
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Cellular communication
Cellular communicationCellular communication
Cellular communication
 
NETWORK COMPONENTS
NETWORK COMPONENTSNETWORK COMPONENTS
NETWORK COMPONENTS
 
Lan network
Lan networkLan network
Lan network
 
Computer networks
Computer networks   Computer networks
Computer networks
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Computer network & communication answer
Computer network & communication answerComputer network & communication answer
Computer network & communication answer
 
issues in desigining routing protocols
 issues in desigining routing protocols issues in desigining routing protocols
issues in desigining routing protocols
 
Setting up a home network
Setting up a home networkSetting up a home network
Setting up a home network
 
basic networking
basic networkingbasic networking
basic networking
 

Viewers also liked

Sm1 Computer Networks
Sm1 Computer NetworksSm1 Computer Networks
Sm1 Computer NetworksMiriam Tello
 
Computer Networks for Computer Science Student
Computer Networks for Computer Science StudentComputer Networks for Computer Science Student
Computer Networks for Computer Science Studentrprajat007
 
History of Video Games up to 90s
History of Video Games up to 90sHistory of Video Games up to 90s
History of Video Games up to 90sMark Rotondella
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networkssanjeev kumar
 
Unit 1 introduction to computer networks
Unit 1  introduction to computer networksUnit 1  introduction to computer networks
Unit 1 introduction to computer networkspavan kumar Thatikonda
 
Chapter 4 computer networks
Chapter 4   computer networksChapter 4   computer networks
Chapter 4 computer networksPratik Gupta
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And ProtocolsSteven Cahill
 
Types of Network Architecture
Types of Network ArchitectureTypes of Network Architecture
Types of Network Architecturesabari Giri
 
Introduction to Computer Networks
 Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer NetworksGhaffar Khan
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer NetworkingHj Habib
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS Kak Yong
 

Viewers also liked (13)

Sm1 Computer Networks
Sm1 Computer NetworksSm1 Computer Networks
Sm1 Computer Networks
 
Computer Networks for Computer Science Student
Computer Networks for Computer Science StudentComputer Networks for Computer Science Student
Computer Networks for Computer Science Student
 
History of Video Games up to 90s
History of Video Games up to 90sHistory of Video Games up to 90s
History of Video Games up to 90s
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
 
1. computer networks u1 ver 1.0
1. computer networks u1 ver 1.01. computer networks u1 ver 1.0
1. computer networks u1 ver 1.0
 
Computer networks
Computer networksComputer networks
Computer networks
 
Unit 1 introduction to computer networks
Unit 1  introduction to computer networksUnit 1  introduction to computer networks
Unit 1 introduction to computer networks
 
Chapter 4 computer networks
Chapter 4   computer networksChapter 4   computer networks
Chapter 4 computer networks
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
 
Types of Network Architecture
Types of Network ArchitectureTypes of Network Architecture
Types of Network Architecture
 
Introduction to Computer Networks
 Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer Networks
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer Networking
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
 

Similar to Computer Networks

Network ppt
Network pptNetwork ppt
Network ppthlalu861
 
Install network cable module CSS NC2
Install network cable module CSS NC2Install network cable module CSS NC2
Install network cable module CSS NC2wilfredo dela cerna
 
Network plus study guide N10-005
Network plus study guide N10-005 Network plus study guide N10-005
Network plus study guide N10-005 ramloganricki
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And TelecommunicationsUMaine
 
Grade 11 CSS Lesson 3 Computer Network.pptx
Grade 11 CSS Lesson 3 Computer Network.pptxGrade 11 CSS Lesson 3 Computer Network.pptx
Grade 11 CSS Lesson 3 Computer Network.pptxCatherineBotardo3
 
Class Note
Class NoteClass Note
Class NoteAK IJ
 
Network Security and its applications in
Network Security and its applications inNetwork Security and its applications in
Network Security and its applications inssuser6478a8
 
Computer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsComputer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsSubas Paudel
 
Data Communication and Computer Network Overview
Data Communication and Computer Network Overview Data Communication and Computer Network Overview
Data Communication and Computer Network Overview RANVIJAY GAUR
 
Communications and Networking
Communications and NetworkingCommunications and Networking
Communications and NetworkingSajitha Pathirana
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12LakshyaT
 
2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.pptjaba kumar
 
Computer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.pptComputer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.pptmv9499596
 

Similar to Computer Networks (20)

Fg c
Fg cFg c
Fg c
 
Network ppt
Network pptNetwork ppt
Network ppt
 
COMPUTER NETWORKS
COMPUTER NETWORKSCOMPUTER NETWORKS
COMPUTER NETWORKS
 
final NEtworking.pptx
final  NEtworking.pptxfinal  NEtworking.pptx
final NEtworking.pptx
 
Install network cable module CSS NC2
Install network cable module CSS NC2Install network cable module CSS NC2
Install network cable module CSS NC2
 
Network plus study guide N10-005
Network plus study guide N10-005 Network plus study guide N10-005
Network plus study guide N10-005
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
 
Grade 11 CSS Lesson 3 Computer Network.pptx
Grade 11 CSS Lesson 3 Computer Network.pptxGrade 11 CSS Lesson 3 Computer Network.pptx
Grade 11 CSS Lesson 3 Computer Network.pptx
 
Class Note
Class NoteClass Note
Class Note
 
Network Security and its applications in
Network Security and its applications inNetwork Security and its applications in
Network Security and its applications in
 
Computer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsComputer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber Ethics
 
Data Communication and Computer Network Overview
Data Communication and Computer Network Overview Data Communication and Computer Network Overview
Data Communication and Computer Network Overview
 
Networks
NetworksNetworks
Networks
 
Communications and Networking
Communications and NetworkingCommunications and Networking
Communications and Networking
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12
 
Cct203 lesson 10
Cct203 lesson 10Cct203 lesson 10
Cct203 lesson 10
 
2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt
 
Computer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.pptComputer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.ppt
 
Communications
CommunicationsCommunications
Communications
 
Networking
NetworkingNetworking
Networking
 

More from Mark Rotondella

History of Computer Animation
History of Computer AnimationHistory of Computer Animation
History of Computer AnimationMark Rotondella
 
Computer Hardware Basics
Computer Hardware BasicsComputer Hardware Basics
Computer Hardware BasicsMark Rotondella
 
History of Video Games 90s till 00
History of Video Games 90s till 00History of Video Games 90s till 00
History of Video Games 90s till 00Mark Rotondella
 
Design Principles and Elements
Design Principles and ElementsDesign Principles and Elements
Design Principles and ElementsMark Rotondella
 
Sustainability in Design
Sustainability in DesignSustainability in Design
Sustainability in DesignMark Rotondella
 
Goldern Ratio and the Rule of Thirds
Goldern Ratio and the Rule of ThirdsGoldern Ratio and the Rule of Thirds
Goldern Ratio and the Rule of ThirdsMark Rotondella
 
Occupational Health and Safety (Australia)
Occupational Health and Safety (Australia)Occupational Health and Safety (Australia)
Occupational Health and Safety (Australia)Mark Rotondella
 
Shannon and Weaver Communication Model
Shannon and Weaver Communication ModelShannon and Weaver Communication Model
Shannon and Weaver Communication ModelMark Rotondella
 

More from Mark Rotondella (16)

History of Video Games
History of Video GamesHistory of Video Games
History of Video Games
 
Great People in IT
Great People in ITGreat People in IT
Great People in IT
 
History of Computer Animation
History of Computer AnimationHistory of Computer Animation
History of Computer Animation
 
3rd Form Normalisation
3rd Form Normalisation3rd Form Normalisation
3rd Form Normalisation
 
Google Search Tips
Google Search TipsGoogle Search Tips
Google Search Tips
 
Computer Hardware Basics
Computer Hardware BasicsComputer Hardware Basics
Computer Hardware Basics
 
Great People in IT
Great People in ITGreat People in IT
Great People in IT
 
File Formats
File FormatsFile Formats
File Formats
 
Data management
Data managementData management
Data management
 
History of Video Games 90s till 00
History of Video Games 90s till 00History of Video Games 90s till 00
History of Video Games 90s till 00
 
Design Principles and Elements
Design Principles and ElementsDesign Principles and Elements
Design Principles and Elements
 
Sustainability in Design
Sustainability in DesignSustainability in Design
Sustainability in Design
 
Goldern Ratio and the Rule of Thirds
Goldern Ratio and the Rule of ThirdsGoldern Ratio and the Rule of Thirds
Goldern Ratio and the Rule of Thirds
 
Occupational Health and Safety (Australia)
Occupational Health and Safety (Australia)Occupational Health and Safety (Australia)
Occupational Health and Safety (Australia)
 
Shannon and Weaver Communication Model
Shannon and Weaver Communication ModelShannon and Weaver Communication Model
Shannon and Weaver Communication Model
 
Key Movements in Design
Key Movements in DesignKey Movements in Design
Key Movements in Design
 

Recently uploaded

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 

Computer Networks

  • 2. Networks A network is a collection of computers and devices connected together via communication devices and transmission media.
  • 3. LAN A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school computer laboratory, office building or closely positioned group of buildings.
  • 5. Advantages • Speed Sharing within networks is very rapid and can save time. • Cost Site-licensed (shared) versions are available at considerable savings. Programs stored on a network’s server allow for easy upgrading. • Security Sensitive files and programs on a network are easily password-protected. • Peripheral equipment sharing Resources such as printers, modems can be shared. • Electronic mail • Centralised software management Greatly reduces the need to spend time and energy installing updates and tracking files on independent computers throughout the building. • Workgroup computing Workgroup software allows many users to work on a document or project concurrently
  • 7. Disadvantages of networking • The cabling, network cards, file servers, etc that are required to set up a network are expensive. • If a server fails the entire network may stop operating. • Viruses can spread from one computer to another over a network. • Decisions on resource planning tend to become centralised. • Networks that have grown with little thought or appropriate planning can be inefficient in the long term. • As traffic increases on a network, performance declines unless it is properly designed.
  • 10. Client/Server On a client/server network, one or more computers act as a server, and the other computers on the network request services from the server. The other computers and mobile devices on the network are referred to as clients.
  • 12. Peer-to-Peer Peer-to peer network is a simple inexpensive network that typically connects fewer than 10 computers. Each computer called a peer, has equal responsibilities and capabilities, sharing hardware (such as a printer), data etc.
  • 13. Network Topologies A network topology refers to the layout of the computers and devices in a communications network. Three commonly used network topologies are bus, ring and star. Networks usually use combinations of bus and star topologies.
  • 15. Bus Network A bus network consists of a single central cable, to which all computers and other devices (nodes) connect. The bus is the physical cable that connects the computers and other devices. It transmits data, instructions, and information in both directions. When a sending device transmits data, the address of the receiving device is included with the transmission so the data is routed to the appropriate receiving device.
  • 16. Bus Network Bus networks are popular on LANs because they are inexpensive and easy to install. Computers and other devices can be attached and detached at any point on the bus without disturbing the rest of the network. The main disadvantage is the limit in size of the bus.
  • 18. Star Network On a star network, all of the computers and devices (nodes) on the network connect to a central device, thus forming a star. Two types of device that provide a common central connection point on the network are a hub and a switch.
  • 19. Star Network • Star networks are fairly easy to install and maintain. Nodes can be added and removed from the network no disruption to the network.
  • 20. Star Network If one node fails, only that node is affected. If the hub/switch fails the entire network is inoperable. Most star networks consist of multiple switches though and in that case only the part of the network connected to that switch will fail
  • 21. Network Communication Standards A network standard defines guidelines that specify the way computers access a network, the types of medium used, the speeds used and the type/s of physical cable and/or wireless technology used. A standard that outlines how two network devices communicate is called a protocol.
  • 23. Ethernet • Ethernet is the most popular network standard for LANs because it is relatively inexpensive and easy to install and maintain. • Ethernet is based on the bus topology, but Ethernet networks can wired in a star pattern.
  • 24. Ethernet 802.3 • The Ethernet (IEEE 802.3) standard for Local Area Networks (LANs). The 802.3 standard (also called Twisted Pair Ethernet) uses a twisted-pair cable for distances up to 100m. • 10Base-T - operates at 10 Mbps - uses a twisted-pair cable with maximum lengths of 100 meters. • 100Base-T – operates at 100 Mbps – often referred to as fast internet – can use – two or four paris of twisted wires or fibre optic cables. • 1000Base-T – operates 1Gb/s – CAT-5 cabling • 10GbE – operates 10Gb/s – copper (CAT6a or better) or fibre cabling
  • 25. WiFi
  • 26. WiFi A wireless network uses radio waves, just like cell phones, televisions and radios do. In fact, communication across a wireless network is a lot like two-way radio communication. Here's what happens: 1. A computer's wireless adapter translates data into a radio signal and transmits it using an antenna. 2. A wireless router receives the signal and decodes it. The router sends the information to the Internet using a physical, wired Ethernet connection. 802.11 • IEEE 802.11 is a set of standards for implementing wireless local area network (WLAN) computer.
  • 27. Building a Wireless Network 1. A port to connect to your cable or DSL modem 2. A router 3. An Ethernet hub 4. A firewall 5. A wireless access point
  • 29. Bluetooth Bluetooth takes small-area networking to the next level by removing the need for user intervention and keeping transmission power extremely low to save battery power. The big draws of Bluetooth are that it is wireless, inexpensive and automatic.
  • 30. Wireless Security WiFi Protected Access (WPA) is now part of the 802.11i wireless network security protocol. It uses encryption and involves signing on with a password. Most public hotspots are either open or use WPA or 128-bit WEP technology (Wired Equivalency Privacy – an older form of security)
  • 31. Wireless Application Protocol • Wireless Application Protocol (WAP) is a technical standard for accessing information over a mobile (phone) wireless network. A WAP browser is a web browser for mobile devices such as mobile phones that uses the protocol.
  • 33. TCP/IP Transmission Control Protocol/Internet Protocol, TCP/IP is a network standard, that defines how data is routed from one end of a network to the other end, ensuring the data arrives correctly. It describes rules for; • dividing data into small pieces, called packets • providing addresses for each packet, • checking for and detection of errors, • sequencing packets and, • regulating the flow of messages along the network TCP/IP has been adopted as a network standard for Internet communications.
  • 34. Short for HyperText Transfer Protocol, HTTP is the underlying protocol used by the World Wide Web. HTTP defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands.
  • 35. HTTPS is a communications protocol for secure communication over a computer network, with especially wide deployment on the Internet. Historically, HTTPS connections were primarily used for payment transactions on the World Wide Web, e-mail and for sensitive transactions in corporate information systems. In the late 2000s and early 2010s, HTTPS began to see widespread use for protecting page authenticity on all types of websites, securing accounts and keeping user communications, identity and web browsing private.
  • 36. Routers, Packets, Switches, Hubs, and Firewalls
  • 37. Routers When you send e-mail to a friend on the other side of the country, how does the message know to end up on your friend's computer, rather than on one of the millions of other computers in the world? Much of the work to get a message from one computer to another is done by routers, because they're the crucial devices that let messages flow between networks, rather than within networks.
  • 38. Packets Internet data, whether in the form of a Web page, a downloaded file or an e-mail message, travels over a system known as a packet-switching network. In this system, the data in a message or file is broken up into packets about 1,500 bytes long. Each of these packets includes information on the sender's address, the receiver's address, the packet’s place in the entire message, and how the receiving computer can be sure that the packet arrived intact.
  • 39. NIC • Network Interface Card (NIC), an expansion board you insert into a computer so the computer can be connected to a network. • These days this functionality is already built into the motherboard and so a NIC is not needed.
  • 40. Modem • Short for MOdulator-DEModulator. A modem is a device or program that enables a computer to connect to the internet or simply transmit data over, for example, telephone or cable lines. Ye olden modems converted from analogue to digital and back again but modern modems do not need to do this anymore.
  • 41. Switch • Switches allow different nodes (a network connection point, typically a computer) of a network to communicate directly with one another in a smooth and efficient manner. • Essentially, a LAN switch creates a series of instant networks that contain only the two devices communicating with each other at that particular moment.
  • 42. Firewall • A firewall is simply a program or hardware device that filters the information coming through the Internet connection into your private network or computer system.
  • 43. More Hardware Stuff • DSL Modem • Hotspt (Wifi) • Network Interface Card • Ethernet Cabling • Fibre Optic Cable