SlideShare una empresa de Scribd logo
1 de 72
Network standards ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IEEE 802.1 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IEEE 802.2 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IEEE 802.3  ,[object Object]
IEEE 802.4 ,[object Object],[object Object],[object Object],[object Object],[object Object]
IEEE 802.5 and IEEE 802.6 ,[object Object],[object Object],[object Object],[object Object]
OSI Model ,[object Object],[object Object],[object Object],[object Object],[object Object]
OSI Model
OSI Model Layer 1 ,[object Object],[object Object]
OSI Layers
OSI Model Layer 2 ,[object Object],[object Object],[object Object]
OSI Layers  ,[object Object],[object Object],[object Object]
OSI Model Layer 3 ,[object Object],[object Object]
OSI Layers
OSI Model Layer 3 ,[object Object],[object Object],[object Object],[object Object]
OSI Layers
OSI Layers
OSI Layers
OSI Layers
Peer-to-Peer Communication
TCP/IP Model
Encapsulation
Names for Data at Each Layer
LOCAL AND WIDE AREA NETWORKS
LAN Technologies   ,[object Object],[object Object]
Media Access Control methods ,[object Object],[object Object],[object Object],[object Object],[object Object]
Ethernet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Token Ring   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
NETWORK ACCESS METHODS   ,[object Object],[object Object],[object Object],[object Object],[object Object]
Collision   ,[object Object],[object Object],[object Object]
NETWORK ACCESS METHODS ,[object Object],[object Object],[object Object],[object Object]
NETWORK ACCESS METHODS ,[object Object],[object Object],[object Object]
NETWORK ACCESS METHODS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
NETWORK ACCESS METHODS ,[object Object],[object Object],[object Object],[object Object],[object Object]
Fast Ethernet ,[object Object],[object Object],[object Object],[object Object]
FDDI (Fiber Distributed Data Interface) :  ,[object Object],[object Object],[object Object],[object Object]
Carrier sense multiple access networks collision detection (CSMA/CD)   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Collision ,[object Object],[object Object],[object Object]
Circuit Switching vs. Packet Switching   ,[object Object],[object Object],[object Object]
Packet-switching ,[object Object],[object Object],[object Object]
Mobile Computing ,[object Object],[object Object]
Updated IP Requirements   ,[object Object],[object Object]
Need for the Mobile IP Design   ,[object Object],[object Object],[object Object],[object Object]
Need for the Mobile IP Design ,[object Object],[object Object]
Need for the Mobile IP Design ,[object Object],[object Object]
What is Mobile IP?   ,[object Object],[object Object],[object Object]
What is Mobile IP? ,[object Object],[object Object],[object Object]
Mobile IP Functional Entities ,[object Object],[object Object],[object Object],[object Object],[object Object]
Mobile IP Functional Entities ,[object Object],[object Object],[object Object],[object Object]
Mobile IP topology
Mobile IP topology   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PERFORMANCE EVALUATION   ,[object Object],[object Object],[object Object]
Connection-oriented service and Connectionless service ,[object Object],[object Object],[object Object],[object Object]
Connectionless ,[object Object],[object Object],[object Object],[object Object]
Connection oriented service
Network performance characteristics ,[object Object],[object Object]
The Last Unit
Network Management ,[object Object],[object Object],[object Object],[object Object]
Network Quality of service ,[object Object],[object Object]
Dropped packets ,[object Object],[object Object]
Delay ,[object Object]
Jitter ,[object Object],[object Object],[object Object]
Out-of-order delivery ,[object Object],[object Object]
Error ,[object Object],[object Object]
Internet Service Provider (ISP) ,[object Object],[object Object],[object Object]
ISP Interconnection ,[object Object],[object Object]
Domain names and name services ,[object Object],[object Object]
The Domain Name System (DNS) ,[object Object],[object Object],[object Object]
Network Security and Firewall ,[object Object]
Firewall ,[object Object],[object Object]
Firewall techniques ,[object Object],[object Object],[object Object],[object Object]
End of course Bye, Bye!!! Second test, when?

Más contenido relacionado

La actualidad más candente

Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ring
Abhijeet Shah
 
IEEE standards and Data Link Layer Protocol
IEEE standards and Data Link Layer ProtocolIEEE standards and Data Link Layer Protocol
IEEE standards and Data Link Layer Protocol
Sajith Ekanayaka
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
Jason Hando
 

La actualidad más candente (20)

Ethernet and Token ring (Computer Networks)
Ethernet and Token ring (Computer Networks)Ethernet and Token ring (Computer Networks)
Ethernet and Token ring (Computer Networks)
 
Token Ring Basic Concepts
Token Ring Basic ConceptsToken Ring Basic Concepts
Token Ring Basic Concepts
 
Token ring
Token ringToken ring
Token ring
 
Ethernet
EthernetEthernet
Ethernet
 
token bus
 token bus token bus
token bus
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ring
 
Ethernet technology
Ethernet technologyEthernet technology
Ethernet technology
 
IEEE standards and Data Link Layer Protocol
IEEE standards and Data Link Layer ProtocolIEEE standards and Data Link Layer Protocol
IEEE standards and Data Link Layer Protocol
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
 
The ethernet frame a walkthrough
The ethernet frame a walkthroughThe ethernet frame a walkthrough
The ethernet frame a walkthrough
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
Ethernet
EthernetEthernet
Ethernet
 
Ethernet
EthernetEthernet
Ethernet
 
FDDI
FDDIFDDI
FDDI
 
FDDI AND TOKEN Ring
 FDDI AND TOKEN Ring FDDI AND TOKEN Ring
FDDI AND TOKEN Ring
 
Ethernet
EthernetEthernet
Ethernet
 
Glimpse of carrier ethernet
Glimpse of carrier ethernetGlimpse of carrier ethernet
Glimpse of carrier ethernet
 
Ethernet Frames Explained
Ethernet Frames ExplainedEthernet Frames Explained
Ethernet Frames Explained
 
Media Access Layer
Media Access LayerMedia Access Layer
Media Access Layer
 
Chap.1 ethernet introduction
Chap.1 ethernet introductionChap.1 ethernet introduction
Chap.1 ethernet introduction
 

Destacado (16)

Token Ring : 802.5
Token Ring : 802.5Token Ring : 802.5
Token Ring : 802.5
 
Ieee 802
Ieee 802Ieee 802
Ieee 802
 
Man
ManMan
Man
 
Lan Ethernet Fddi 03 Format
Lan Ethernet Fddi  03 FormatLan Ethernet Fddi  03 Format
Lan Ethernet Fddi 03 Format
 
Token bus standard
Token bus standardToken bus standard
Token bus standard
 
13 Wired Lans_Ethernet
13 Wired Lans_Ethernet13 Wired Lans_Ethernet
13 Wired Lans_Ethernet
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
17 SONET/SDH
17 SONET/SDH17 SONET/SDH
17 SONET/SDH
 
Hdlc
HdlcHdlc
Hdlc
 
IEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer NetworksIEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer Networks
 
HDLC(high level data link control)
HDLC(high level data link control)HDLC(high level data link control)
HDLC(high level data link control)
 
Tally 9-voucher-entry-questions
Tally 9-voucher-entry-questionsTally 9-voucher-entry-questions
Tally 9-voucher-entry-questions
 
IEEE Standards
IEEE StandardsIEEE Standards
IEEE Standards
 
Dqdb
DqdbDqdb
Dqdb
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 

Similar a Networking and Data Communications

Capitulo 9 Exploration Network
Capitulo 9 Exploration NetworkCapitulo 9 Exploration Network
Capitulo 9 Exploration Network
fherjaramillo
 
The IP network is a virtual network and must rely on a link layer ne.pdf
The IP network is a virtual network and must rely on a link layer ne.pdfThe IP network is a virtual network and must rely on a link layer ne.pdf
The IP network is a virtual network and must rely on a link layer ne.pdf
SALES97
 
Ethernet networking
Ethernet networkingEthernet networking
Ethernet networking
Raghu nath
 
Class_notes_InternetTechnology
Class_notes_InternetTechnologyClass_notes_InternetTechnology
Class_notes_InternetTechnology
Gulrez Khan
 

Similar a Networking and Data Communications (20)

Chapter 4ver2
Chapter 4ver2Chapter 4ver2
Chapter 4ver2
 
Capitulo 9 Exploration Network
Capitulo 9 Exploration NetworkCapitulo 9 Exploration Network
Capitulo 9 Exploration Network
 
The IP network is a virtual network and must rely on a link layer ne.pdf
The IP network is a virtual network and must rely on a link layer ne.pdfThe IP network is a virtual network and must rely on a link layer ne.pdf
The IP network is a virtual network and must rely on a link layer ne.pdf
 
Multimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communicationsMultimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communications
 
chaptet 4 DC and CN.ppt
chaptet 4 DC and CN.pptchaptet 4 DC and CN.ppt
chaptet 4 DC and CN.ppt
 
Ethernet networking
Ethernet networkingEthernet networking
Ethernet networking
 
5 Lan
5 Lan5 Lan
5 Lan
 
Ethernet
EthernetEthernet
Ethernet
 
Advanced Network Chapter I: Which is very best lecture note
Advanced Network Chapter I: Which is very best lecture noteAdvanced Network Chapter I: Which is very best lecture note
Advanced Network Chapter I: Which is very best lecture note
 
Networks
Networks   Networks
Networks
 
Ethernet and switches
Ethernet and switchesEthernet and switches
Ethernet and switches
 
CCNA Report
CCNA ReportCCNA Report
CCNA Report
 
КЛМ_Урок 5
КЛМ_Урок 5КЛМ_Урок 5
КЛМ_Урок 5
 
LAN_ROHIT_KUMAR_SHAH.pptx
LAN_ROHIT_KUMAR_SHAH.pptxLAN_ROHIT_KUMAR_SHAH.pptx
LAN_ROHIT_KUMAR_SHAH.pptx
 
OSI model (7 layer )
OSI model (7 layer ) OSI model (7 layer )
OSI model (7 layer )
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networking
 
computer network basics
computer network basicscomputer network basics
computer network basics
 
Class_notes_InternetTechnology
Class_notes_InternetTechnologyClass_notes_InternetTechnology
Class_notes_InternetTechnology
 
Concept of networking
Concept of networkingConcept of networking
Concept of networking
 
Computer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link LayerComputer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link Layer
 

Último

Último (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 

Networking and Data Communications