SlideShare une entreprise Scribd logo
1  sur  15
Ch-1
Networking
Made by:
Sandhya Jeswani Panjwani
1
1. Networking
2. Computer Networking
3. Advantages of Computer Networking
4. Networking Components
5. Types of Networking
6. Network Architecture
7. Network Topology
8. Accessing a file from the Local Network
9. Let’s know more
Contents
2
In our daily life, we come across different types of networks. For examples:
 Network of roads, railway lines, canals.
 Communication network of telephone system, mobile phones and social networking on Internet.
 Network of Banks & ATMs.
 Radio and television network.
 Network of malls, schools, hospitals etc all over the country.
Imagine life without networking… No phone, No TV, No Internet. It’s unbelievable.
So here it is very much clear that networking is nothing but any kind of connection.
Networking
3
Computer Networking
A computer network can be defined as a group of computers and other peripheral
devices that are linked together for the purpose of sharing data and hardware
resources.
The computers in a network can communicate with each other as well as work
independently.
Each computer in a network is called a Node.
The computer not taking part in network is called Stand-Alone Computer.
 The devices attached to the computer are peripherals, ex- printer, scanner etc.
The computers can be linked in a network through cables, telephone lines, radio
waves or infrared light beams.
Hub
Stand Alone computer
Node 1
Node 2
Node 3
Node 4
Node 5
4
Advantages of Computer Networking
The data can be stored centrally on one big hard disk in the server and shared to
other computers. Hence it makes efficient use of storage media.
The information can be preserved by taking regular backups on a central location
rather than on a number of stand alone computers.
The hardware devices such as modems, printers, scanners, CD-writers etc. can be
shared and this way hardware cost reduces.
Networking brings efficiency and effectiveness as the upgradation, deletion or
modification of the data and software is done at a single point only.
The files are shared on the network and it reduces the need for the hard copies of
all documents.
The soft copies of the documents can be delivered fro one computer to another
throughout the world using E-mail facility.
5
Networking components
In Wired Networking establishment:-
1) Network Interface Card (Ethernet Network Card): Most new motherboards
already have a built-in network interface. It is required so that the computer can
connect to a network such as a hub/switch or to a broadband router to access the
Internet. Or, we can say that it is used to physically attach a computer to a network.
2) Network Cable (Ethernet Cable): Network cables are used to connect and transfer
data and information between computers, routers, switches and storage area networks .
These cables are essentially the carrier or media through which data flows. Modern
Ethernet Networks use twisted pair cable which contain eight wires. An RJ-45
connector is crimped at both the ends of the cable.
3) Hubs and Switches: a Hub or Switch is an interface through which the computers
can be connected and data can be sent and received. It is a box with a set of RJ-45 ports.
The computers on a network are connected to the Hub/Switch via Network Cables.
Now a days Switches have replaced Hubs because of their better efficiency.
6
Networking components
In Wireless Networking establishment:-
1) Wireless Network Interface Card: WNIC is used in wireless networking instead of
Ethernet Card used in wired networking. It connects the computers to the network
physically. This card uses an antenna to communicate via microwave radiation. Modern
laptops have inbuilt Wireless Network Cards.
2) Wireless Access Points (WAP) or Routers: The heart of the wireless network is the
WAP or Router. As in wired network, the hub is a central point, in the same way here,
WAP or Router is the central point. It also helps connect your wireless network to the
Internet. It has a wireless antenna which boosts up the communication range of the
radio signals.
Note:- Ethernet cable is not required here as Radio waves and Infrared light beam
signals are used as the carrier to transmit data.
7
Types of Computer Networks
Based on Size
PAN
(Personal Area
network)
LAN
(Local Area Network)
MAN
(Metropolitan Area
Network)
WAN
(Wide Area Network)
Based on Purposes
WLAN
(Wireless Local Area
network)
VPN
(Virtual Private Network)
SAN
(Storage Area Network)
CAN
(Campus Area Network)
8
Based on Sizes
1) PAN : It handles the interconnection of IT devices at the surrounding of a single user. such as: mouse
and keyboards, mobile phone, Bluetooth, printer etc.
2) LAN : It connects network devices over a short distance. Ex- an office, school, or home. LANs are
owned, controlled, and managed by a single person or organization.
3) MAN : It spans a physical area larger than a LAN but smaller than a WAN, such as a city. It is typically
owned by a single entity such as a government body.
4) WAN : It spans a large physical distance. The Internet is the largest WAN, spanning the Earth.
LAN and WAN are the two primary and best-known categories of area networks, while the
others have emerged with technology advances.
Types of Computer Networks
Based on Purposes
1) WLAN : It is a LAN that allows devices to connect and communicate wirelessly.
2) VPN: It secures connection between two devices connected to the Internet, also helps in adding
cyber privacy and security to public and private networks such as Internet and Wi-Fi hotspots.
3) SAN : It connects servers to data storage devices, primarily used to enhance storage devices, such
as disk arrays and tap libraries.
4) CAN: It is a network spanning multiple LANs such as on a university or local business campus .9
Network Architecture
Types of Network Architecture
Client-Server Network Peer to Peer Network
Network architecture is an overall physical layout or design of computers that ensures how the
computers are configured in a network.
Server:- The main computer on the network that provides services to the clients and controls access to
hardware, software & other resources.
Clients:- All the computers in network which request services from the server, like data retrieval, storage etc.
Client/Server Network:- Here, several computers (clients or workstations) are connected
to the main computer (server).
Peer to Peer Network:- This architecture is used where a few computers with equal
capacity are connected together to use resources of the network. Here, each computer
can act as a server as well as client as no central server is there in Peer to Peer network. 10
Network Topology
Types of Network Topology
Star Topology Ring Topology Bus Topology Mesh Topology
Network topology is an art of connecting different computers in a network. It determines the data paths
between two nodes in the network.
Bus Topology
11
Network Security
Network security is means protecting data and resources from access by unauthorized people. The data
and resources can be misused or modified. It is controlled by the network administrator.
General levels of Network Security
Login Security Rights Security
Login Security:- A user is given a unique login name and
password.
Rights Security:- A user is given rights (like Read only
access, Real-Write access, no access) on the basis of user
name.
12
Accessing a file from a shared drive
Opening a file on the network:-
1) Double-click on the Network icon on the desktop.
2) The View Pane opens with a list of shared drives.
3) Click on the required shared drive (Network folder) to see its contents.
4) Find the required file/folder and double-click it to open.
Copying a file from the network on a Local Disk:-
1) Right-click the file in the Network icon in view pane  Select Copy.
2) In the left pane, select Computer icon  open any Local Disk (e.g.
Drive E).
3) Right-click in the view pane  Select Paste.
13
Let’s Know More
Conferencing : When two users have simultaneous conversation via Internet.
Video Conferencing : When the above process is added by live video.
Wireless communication uses low powered/high powered radio waves to transmit data
between devices.
In wireless networking, connection is done without cables. The spaces such as outdoor
areas, where cables can’t be arranged, can have wireless network.
Bluetooth: A wireless technology used to interconnect mobile phones, printers,
computers in a short range.
Wi-fi (Wireless Fidelity): It represents wireless Local Area Network(WLAN). It
is developed for mobile computers (laptop, smart phones, tablets etc.) to
exchange data wirelessly over a network.
Protocols : A set of rules and signals that computers use to communicate on the network.
The most popular LAN protocol is Ethernet.
14
Career in IT
A Computer Network Architect designs computer networks,
including LAN, WAN and other data communication systems.
How to become:- Bachelor’s degree in Computer
Science/Information System or related fields.
Skills:- Time management, active listening, active learning,
strong problem solving skills.
15

Contenu connexe

Tendances

PPT ON COMPUTER NETWORK AND IT'S TYPES.
PPT ON COMPUTER NETWORK AND IT'S TYPES.PPT ON COMPUTER NETWORK AND IT'S TYPES.
PPT ON COMPUTER NETWORK AND IT'S TYPES.satyamjipatel
 
internet and its services
internet and its servicesinternet and its services
internet and its servicesamitpal163
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS Kak Yong
 
Types of computer network
Types of computer networkTypes of computer network
Types of computer networkAmit Shaw
 
Networking Devices
Networking DevicesNetworking Devices
Networking DevicesNitin16498
 
Computer networking ppt
Computer networking pptComputer networking ppt
Computer networking pptJitender Kumar
 
Network ppt
Network pptNetwork ppt
Network ppthlalu861
 
Networking concepts
Networking conceptsNetworking concepts
Networking conceptsseemadav1
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12LakshyaT
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networkingkieshore
 
Internet Services
Internet Services Internet Services
Internet Services GLG
 
Computer Network
Computer NetworkComputer Network
Computer NetworkCma Mohd
 
what is computer
what is computerwhat is computer
what is computerJelz JZ
 

Tendances (20)

PPT ON COMPUTER NETWORK AND IT'S TYPES.
PPT ON COMPUTER NETWORK AND IT'S TYPES.PPT ON COMPUTER NETWORK AND IT'S TYPES.
PPT ON COMPUTER NETWORK AND IT'S TYPES.
 
internet and its services
internet and its servicesinternet and its services
internet and its services
 
Internet ppt
Internet pptInternet ppt
Internet ppt
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
 
Computer network
Computer networkComputer network
Computer network
 
Types of computer network
Types of computer networkTypes of computer network
Types of computer network
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
 
Computer networking ppt
Computer networking pptComputer networking ppt
Computer networking ppt
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
networking
networkingnetworking
networking
 
Ppt on internet
Ppt on internetPpt on internet
Ppt on internet
 
Network ppt
Network pptNetwork ppt
Network ppt
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Internet Services
Internet Services Internet Services
Internet Services
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Network protocals
Network protocalsNetwork protocals
Network protocals
 
internet ppt
internet pptinternet ppt
internet ppt
 
what is computer
what is computerwhat is computer
what is computer
 

Similaire à Class viii ch-1 networking concepts

Computer networking project
Computer networking projectComputer networking project
Computer networking projectAshifimrankhan1
 
10 New Web Application and Security.pptx
10 New Web Application and Security.pptx10 New Web Application and Security.pptx
10 New Web Application and Security.pptxAkshayIngole17
 
Computer network
Computer networkComputer network
Computer networkMd Saylab
 
Computer network unit 1 notes
Computer network unit  1 notesComputer network unit  1 notes
Computer network unit 1 notesRavi Rajput
 
computer networks
computer networks computer networks
computer networks MiXvideos
 
Computer Network Second Edition
Computer Network Second EditionComputer Network Second Edition
Computer Network Second EditionMd Saylab
 
Introduction to Computer Networks: Basic concept of Computer networks Goals o...
Introduction to Computer Networks: Basic concept of Computer networks Goals o...Introduction to Computer Networks: Basic concept of Computer networks Goals o...
Introduction to Computer Networks: Basic concept of Computer networks Goals o...MostafizurRahmanMonn
 
Computer network
Computer networkComputer network
Computer networkAnupan Jain
 
Computer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.pptComputer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.pptmv9499596
 
Computer network note
Computer network noteComputer network note
Computer network noteMdAnikKhan
 
Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)saurabh goel
 
Computer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsComputer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsSubas Paudel
 

Similaire à Class viii ch-1 networking concepts (20)

Computer networking project
Computer networking projectComputer networking project
Computer networking project
 
10 New Web Application and Security.pptx
10 New Web Application and Security.pptx10 New Web Application and Security.pptx
10 New Web Application and Security.pptx
 
Computer network
Computer networkComputer network
Computer network
 
Computer network unit 1 notes
Computer network unit  1 notesComputer network unit  1 notes
Computer network unit 1 notes
 
Computer network
Computer networkComputer network
Computer network
 
computer networks
computer networks computer networks
computer networks
 
Networking
NetworkingNetworking
Networking
 
Computer Network Second Edition
Computer Network Second EditionComputer Network Second Edition
Computer Network Second Edition
 
Introduction to Computer Networks: Basic concept of Computer networks Goals o...
Introduction to Computer Networks: Basic concept of Computer networks Goals o...Introduction to Computer Networks: Basic concept of Computer networks Goals o...
Introduction to Computer Networks: Basic concept of Computer networks Goals o...
 
Computer network
Computer networkComputer network
Computer network
 
Computer networks
Computer networksComputer networks
Computer networks
 
Computer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.pptComputer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.ppt
 
Computer network note
Computer network noteComputer network note
Computer network note
 
Lesson 1 introduction
Lesson 1 introductionLesson 1 introduction
Lesson 1 introduction
 
Computer Communications
Computer CommunicationsComputer Communications
Computer Communications
 
Computer network 1
Computer network 1Computer network 1
Computer network 1
 
Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)
 
Computer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsComputer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber Ethics
 
1 computer networks basic
1 computer networks basic1 computer networks basic
1 computer networks basic
 
Internet.pdf
Internet.pdfInternet.pdf
Internet.pdf
 

Dernier

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 

Dernier (20)

TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 

Class viii ch-1 networking concepts

  • 2. 1. Networking 2. Computer Networking 3. Advantages of Computer Networking 4. Networking Components 5. Types of Networking 6. Network Architecture 7. Network Topology 8. Accessing a file from the Local Network 9. Let’s know more Contents 2
  • 3. In our daily life, we come across different types of networks. For examples:  Network of roads, railway lines, canals.  Communication network of telephone system, mobile phones and social networking on Internet.  Network of Banks & ATMs.  Radio and television network.  Network of malls, schools, hospitals etc all over the country. Imagine life without networking… No phone, No TV, No Internet. It’s unbelievable. So here it is very much clear that networking is nothing but any kind of connection. Networking 3
  • 4. Computer Networking A computer network can be defined as a group of computers and other peripheral devices that are linked together for the purpose of sharing data and hardware resources. The computers in a network can communicate with each other as well as work independently. Each computer in a network is called a Node. The computer not taking part in network is called Stand-Alone Computer.  The devices attached to the computer are peripherals, ex- printer, scanner etc. The computers can be linked in a network through cables, telephone lines, radio waves or infrared light beams. Hub Stand Alone computer Node 1 Node 2 Node 3 Node 4 Node 5 4
  • 5. Advantages of Computer Networking The data can be stored centrally on one big hard disk in the server and shared to other computers. Hence it makes efficient use of storage media. The information can be preserved by taking regular backups on a central location rather than on a number of stand alone computers. The hardware devices such as modems, printers, scanners, CD-writers etc. can be shared and this way hardware cost reduces. Networking brings efficiency and effectiveness as the upgradation, deletion or modification of the data and software is done at a single point only. The files are shared on the network and it reduces the need for the hard copies of all documents. The soft copies of the documents can be delivered fro one computer to another throughout the world using E-mail facility. 5
  • 6. Networking components In Wired Networking establishment:- 1) Network Interface Card (Ethernet Network Card): Most new motherboards already have a built-in network interface. It is required so that the computer can connect to a network such as a hub/switch or to a broadband router to access the Internet. Or, we can say that it is used to physically attach a computer to a network. 2) Network Cable (Ethernet Cable): Network cables are used to connect and transfer data and information between computers, routers, switches and storage area networks . These cables are essentially the carrier or media through which data flows. Modern Ethernet Networks use twisted pair cable which contain eight wires. An RJ-45 connector is crimped at both the ends of the cable. 3) Hubs and Switches: a Hub or Switch is an interface through which the computers can be connected and data can be sent and received. It is a box with a set of RJ-45 ports. The computers on a network are connected to the Hub/Switch via Network Cables. Now a days Switches have replaced Hubs because of their better efficiency. 6
  • 7. Networking components In Wireless Networking establishment:- 1) Wireless Network Interface Card: WNIC is used in wireless networking instead of Ethernet Card used in wired networking. It connects the computers to the network physically. This card uses an antenna to communicate via microwave radiation. Modern laptops have inbuilt Wireless Network Cards. 2) Wireless Access Points (WAP) or Routers: The heart of the wireless network is the WAP or Router. As in wired network, the hub is a central point, in the same way here, WAP or Router is the central point. It also helps connect your wireless network to the Internet. It has a wireless antenna which boosts up the communication range of the radio signals. Note:- Ethernet cable is not required here as Radio waves and Infrared light beam signals are used as the carrier to transmit data. 7
  • 8. Types of Computer Networks Based on Size PAN (Personal Area network) LAN (Local Area Network) MAN (Metropolitan Area Network) WAN (Wide Area Network) Based on Purposes WLAN (Wireless Local Area network) VPN (Virtual Private Network) SAN (Storage Area Network) CAN (Campus Area Network) 8
  • 9. Based on Sizes 1) PAN : It handles the interconnection of IT devices at the surrounding of a single user. such as: mouse and keyboards, mobile phone, Bluetooth, printer etc. 2) LAN : It connects network devices over a short distance. Ex- an office, school, or home. LANs are owned, controlled, and managed by a single person or organization. 3) MAN : It spans a physical area larger than a LAN but smaller than a WAN, such as a city. It is typically owned by a single entity such as a government body. 4) WAN : It spans a large physical distance. The Internet is the largest WAN, spanning the Earth. LAN and WAN are the two primary and best-known categories of area networks, while the others have emerged with technology advances. Types of Computer Networks Based on Purposes 1) WLAN : It is a LAN that allows devices to connect and communicate wirelessly. 2) VPN: It secures connection between two devices connected to the Internet, also helps in adding cyber privacy and security to public and private networks such as Internet and Wi-Fi hotspots. 3) SAN : It connects servers to data storage devices, primarily used to enhance storage devices, such as disk arrays and tap libraries. 4) CAN: It is a network spanning multiple LANs such as on a university or local business campus .9
  • 10. Network Architecture Types of Network Architecture Client-Server Network Peer to Peer Network Network architecture is an overall physical layout or design of computers that ensures how the computers are configured in a network. Server:- The main computer on the network that provides services to the clients and controls access to hardware, software & other resources. Clients:- All the computers in network which request services from the server, like data retrieval, storage etc. Client/Server Network:- Here, several computers (clients or workstations) are connected to the main computer (server). Peer to Peer Network:- This architecture is used where a few computers with equal capacity are connected together to use resources of the network. Here, each computer can act as a server as well as client as no central server is there in Peer to Peer network. 10
  • 11. Network Topology Types of Network Topology Star Topology Ring Topology Bus Topology Mesh Topology Network topology is an art of connecting different computers in a network. It determines the data paths between two nodes in the network. Bus Topology 11
  • 12. Network Security Network security is means protecting data and resources from access by unauthorized people. The data and resources can be misused or modified. It is controlled by the network administrator. General levels of Network Security Login Security Rights Security Login Security:- A user is given a unique login name and password. Rights Security:- A user is given rights (like Read only access, Real-Write access, no access) on the basis of user name. 12
  • 13. Accessing a file from a shared drive Opening a file on the network:- 1) Double-click on the Network icon on the desktop. 2) The View Pane opens with a list of shared drives. 3) Click on the required shared drive (Network folder) to see its contents. 4) Find the required file/folder and double-click it to open. Copying a file from the network on a Local Disk:- 1) Right-click the file in the Network icon in view pane  Select Copy. 2) In the left pane, select Computer icon  open any Local Disk (e.g. Drive E). 3) Right-click in the view pane  Select Paste. 13
  • 14. Let’s Know More Conferencing : When two users have simultaneous conversation via Internet. Video Conferencing : When the above process is added by live video. Wireless communication uses low powered/high powered radio waves to transmit data between devices. In wireless networking, connection is done without cables. The spaces such as outdoor areas, where cables can’t be arranged, can have wireless network. Bluetooth: A wireless technology used to interconnect mobile phones, printers, computers in a short range. Wi-fi (Wireless Fidelity): It represents wireless Local Area Network(WLAN). It is developed for mobile computers (laptop, smart phones, tablets etc.) to exchange data wirelessly over a network. Protocols : A set of rules and signals that computers use to communicate on the network. The most popular LAN protocol is Ethernet. 14
  • 15. Career in IT A Computer Network Architect designs computer networks, including LAN, WAN and other data communication systems. How to become:- Bachelor’s degree in Computer Science/Information System or related fields. Skills:- Time management, active listening, active learning, strong problem solving skills. 15