SlideShare una empresa de Scribd logo
1 de 23
INTRODUCTION TO NETWORKS
What is a Network? A network consists of two or more computers that are linked in order to share resources (such as printers and  CD-ROMs), exchange files, or allow electronic communications.  The computers on a network may be linked through cables,  telephone lines, radio waves, satellites, or infrared light beams. INTRODUCTION TO NETWORKS
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TYPES OF NETWORKS NETWORK CAN BE MAINLY CLASSIFIED INTO TWO CATEGORIES . 1. Wired Network – System are connected through cable media  is called as wired Network. 2. Wireless Network – Systems are connected through satellite    is called as wireless Network NETWORK WIRED  NETWORK WIRELESS NETWORK
[object Object],[object Object],[object Object],[object Object],[object Object],NETWORK LAN (Local Area Network) MAN (Metro Politon Area  Network) WAN (Wide Area Network)
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
METROPOLITAN AREA NETWORK (MAN)   Metropolitan Area Network (MAN) covers larger geographic areas, such as cities. Often used by local libraries and government agencies often to connect to citizens and private industries. WIDE AREA NETWORK (WAN)   Wide Area Networks (WANs) connect larger geographic areas,  such as London, the UK, or the world. In this type of network dedicated transoceanic cabling or satellite uplinks may be used.
[object Object],[object Object],[object Object],NETWORK PEER O PEER CLIENT – SERVER TECHNOLOGY
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],CLIENT-SERVER TECHNOLOGY
Client/Server Network
Advantages of a client/server Network: Centralized -  Resources and data security are  controlled through the server.  Scalability - Any or all elements can be replaced  individually as needs increase.  Flexibility -   New technology can be easily  integrated into system.  Interoperability -  All components (client/network/server) work together.  Accessibility -  Server can be accessed remotely and  across multiple platforms.
Disadvantages of a client/server Network: Expense -  Requires initial investment in  dedicated server.  Maintenance -   Large networks will require a  staff to ensure Efficient operation.  Dependence -  When server goes down, operations  will cease across the network.
 

Más contenido relacionado

La actualidad más candente (16)

Seminar report-networking
Seminar report-networkingSeminar report-networking
Seminar report-networking
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of network
 
COMPUTER NETWORK
COMPUTER NETWORKCOMPUTER NETWORK
COMPUTER NETWORK
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorial
 
Computer network
Computer networkComputer network
Computer network
 
Class work 2,computer_network_317
Class work 2,computer_network_317Class work 2,computer_network_317
Class work 2,computer_network_317
 
Types of network
Types of networkTypes of network
Types of network
 
Peer to peer
Peer to peerPeer to peer
Peer to peer
 
Networking fundamentalsss
Networking fundamentalsssNetworking fundamentalsss
Networking fundamentalsss
 
computer networks
computer networks computer networks
computer networks
 
Types of network
Types of networkTypes of network
Types of network
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
Modern computer network technologies
Modern computer network technologies Modern computer network technologies
Modern computer network technologies
 
Introduction to Networks & Networking Concepts
Introduction to Networks & Networking ConceptsIntroduction to Networks & Networking Concepts
Introduction to Networks & Networking Concepts
 
Information Networks - (Covered all the Important Topics)
Information Networks - (Covered all the Important Topics) Information Networks - (Covered all the Important Topics)
Information Networks - (Covered all the Important Topics)
 

Destacado (9)

Hardware8
Hardware8Hardware8
Hardware8
 
Hunja seminar 27th october
Hunja seminar 27th octoberHunja seminar 27th october
Hunja seminar 27th october
 
Hardware5
Hardware5Hardware5
Hardware5
 
Regional planning agency overview
Regional planning agency overviewRegional planning agency overview
Regional planning agency overview
 
Day 1
Day   1Day   1
Day 1
 
Проекты Welcom partners
Проекты Welcom partnersПроекты Welcom partners
Проекты Welcom partners
 
Hardware3
Hardware3Hardware3
Hardware3
 
Hardware3
Hardware3Hardware3
Hardware3
 
Hardware7
Hardware7Hardware7
Hardware7
 

Similar a Hardware1

Networks and telecommunication technologies basics
Networks and telecommunication technologies basicsNetworks and telecommunication technologies basics
Networks and telecommunication technologies basicsDavid Kibuki
 
Computer networks7
Computer networks7Computer networks7
Computer networks7Ali Raza
 
Introduction to networks
Introduction to networksIntroduction to networks
Introduction to networksSagar Gor
 
Network & Networking
Network & NetworkingNetwork & Networking
Network & NetworkingGohil Anshu
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorialRodel Morales
 
Lecture-03 - Introduction To Network.pptx
Lecture-03 - Introduction To Network.pptxLecture-03 - Introduction To Network.pptx
Lecture-03 - Introduction To Network.pptxMd. Sakhawat Hossain
 
Computer networking xii
Computer networking  xiiComputer networking  xii
Computer networking xiisaltyp
 
L1 - Computer Networks Review.pptx
L1 - Computer Networks Review.pptxL1 - Computer Networks Review.pptx
L1 - Computer Networks Review.pptxMohamedFouardKanu
 
CN L1 — копия.ppt
CN L1 — копия.pptCN L1 — копия.ppt
CN L1 — копия.pptAssemNazirova2
 
Impact of computer networking and network devices
Impact of computer networking and network devicesImpact of computer networking and network devices
Impact of computer networking and network devicesJanaki Kaimal
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And TelecommunicationsUMaine
 
Computer Networking Theory Assignment 1
Computer Networking Theory Assignment 1Computer Networking Theory Assignment 1
Computer Networking Theory Assignment 1Hasibul Islam Nirob
 

Similar a Hardware1 (20)

Networks and telecommunication technologies basics
Networks and telecommunication technologies basicsNetworks and telecommunication technologies basics
Networks and telecommunication technologies basics
 
Computer software part 3
Computer software part 3Computer software part 3
Computer software part 3
 
Computer networks7
Computer networks7Computer networks7
Computer networks7
 
Introduction to networks
Introduction to networksIntroduction to networks
Introduction to networks
 
Basic lecture
Basic lectureBasic lecture
Basic lecture
 
Network & Networking
Network & NetworkingNetwork & Networking
Network & Networking
 
Cn
CnCn
Cn
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
Cnetworks
CnetworksCnetworks
Cnetworks
 
Lecture-03 - Introduction To Network.pptx
Lecture-03 - Introduction To Network.pptxLecture-03 - Introduction To Network.pptx
Lecture-03 - Introduction To Network.pptx
 
Computer networking xii
Computer networking  xiiComputer networking  xii
Computer networking xii
 
L1 - Computer Networks Review.pptx
L1 - Computer Networks Review.pptxL1 - Computer Networks Review.pptx
L1 - Computer Networks Review.pptx
 
Computer networks
Computer networksComputer networks
Computer networks
 
CN L1 — копия.ppt
CN L1 — копия.pptCN L1 — копия.ppt
CN L1 — копия.ppt
 
Impact of computer networking and network devices
Impact of computer networking and network devicesImpact of computer networking and network devices
Impact of computer networking and network devices
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
 
Chapter 6.0
Chapter 6.0Chapter 6.0
Chapter 6.0
 
Bis Chapter5
Bis Chapter5Bis Chapter5
Bis Chapter5
 
Unit I Networking.pptx
Unit I Networking.pptxUnit I Networking.pptx
Unit I Networking.pptx
 
Computer Networking Theory Assignment 1
Computer Networking Theory Assignment 1Computer Networking Theory Assignment 1
Computer Networking Theory Assignment 1
 

Más de George Ranson (10)

Hardware9
Hardware9Hardware9
Hardware9
 
Hardware5
Hardware5Hardware5
Hardware5
 
Hardware4
Hardware4Hardware4
Hardware4
 
Hardware1
Hardware1Hardware1
Hardware1
 
Troubleshooting111
Troubleshooting111Troubleshooting111
Troubleshooting111
 
Processor2
Processor2Processor2
Processor2
 
Printer
PrinterPrinter
Printer
 
Hard disk PPT
Hard disk PPTHard disk PPT
Hard disk PPT
 
Getting familiar with pc
Getting familiar with pcGetting familiar with pc
Getting familiar with pc
 
Networking basics
Networking basicsNetworking basics
Networking basics
 

Último

Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 

Último (20)

Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 

Hardware1

  • 2. What is a Network? A network consists of two or more computers that are linked in order to share resources (such as printers and CD-ROMs), exchange files, or allow electronic communications. The computers on a network may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams. INTRODUCTION TO NETWORKS
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. TYPES OF NETWORKS NETWORK CAN BE MAINLY CLASSIFIED INTO TWO CATEGORIES . 1. Wired Network – System are connected through cable media is called as wired Network. 2. Wireless Network – Systems are connected through satellite is called as wireless Network NETWORK WIRED NETWORK WIRELESS NETWORK
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. METROPOLITAN AREA NETWORK (MAN) Metropolitan Area Network (MAN) covers larger geographic areas, such as cities. Often used by local libraries and government agencies often to connect to citizens and private industries. WIDE AREA NETWORK (WAN) Wide Area Networks (WANs) connect larger geographic areas, such as London, the UK, or the world. In this type of network dedicated transoceanic cabling or satellite uplinks may be used.
  • 16.
  • 17.
  • 18.
  • 19.
  • 21. Advantages of a client/server Network: Centralized - Resources and data security are controlled through the server. Scalability - Any or all elements can be replaced individually as needs increase. Flexibility - New technology can be easily integrated into system. Interoperability - All components (client/network/server) work together. Accessibility - Server can be accessed remotely and across multiple platforms.
  • 22. Disadvantages of a client/server Network: Expense - Requires initial investment in dedicated server. Maintenance - Large networks will require a staff to ensure Efficient operation. Dependence - When server goes down, operations will cease across the network.
  • 23.