SlideShare une entreprise Scribd logo
1  sur  27
15-1
Networking
• Computer network A collection of
computing devices that are connected in
various ways in order to communicate and
share resources
Usually, the connections between
computers in a network are made using
physical wires or cables
However, some connections are wireless,
using radio waves or infrared signals
15-2
Networking
• The generic term node or host refers to
any device on a network
• Data transfer rate The speed with which
data is moved from one place on a
network to another
• Data transfer rate is a key issue in
computer networks
15-3
Networking
• Computer networks have opened up an
entire frontier in the world of computing
called the client/server model
Figure 15.1 Client/Server interaction
15-4
Networking
• File server A computer that stores and
manages files for multiple users on a
network
• Web server A computer dedicated to
responding to requests (from the browser
client) for web pages
15-5
Types of Networks
• Local-area network (LAN) A network
that connects a relatively small number of
machines in a relatively close
geographical area
15-6
Types of Networks
• Various configurations, called topologies, have
been used to administer LANs
– Ring topology A configuration that connects all
nodes in a closed loop on which messages travel in
one direction
– Star topology A configuration that centers around
one node to which all others are connected and
through which all messages are sent
– Bus topology All nodes are connected to a single
communication line that carries messages in both
directions
Types of Networks
• A bus technology called Ethernet has become the
industry standard for local-area networks
Figure 15.2 Various network topologies
15-10
15-8
Types of Networks
• Wide-area network (WAN) A network that
connects two or more local-area networks over a
potentially large geographic distance
Often one particular node on a LAN is set up to serve
as a gateway to handle all communication going
between that LAN and other networks
Communication between networks is called
internetworking
The Internet, as we know it today, is essentially the
ultimate wide-area network, spanning the entire globe
15-9
Types of Networks
• Metropolitan-area network (MAN) The
communication infrastructures that have
been developed in and around large cities
15-10
So, who owns the Internet?
Well, nobody does. No single person or
company owns the Internet or even
controls it entirely. As a wide-area
network, it is made up of many smaller
networks. These smaller networks are
often owned and managed by a person or
organization. The Internet, then, is really
defined by how connections can be made
between these networks.
15-11
Types of Networks
Figure 15.1 Local-area networks connected across a distance to
create a wide-area network
15-12
Internet Connections
• Internet backbone A set of high-speed
networks that carry Internet traffic
These networks are provided by
companies such as AT&T, GTE, and IBM
• Internet service provider (ISP) A
company that provides other companies or
individuals with access to the Internet
15-13
Internet Connections
• There are various technologies available that you can
use to connect a home computer to the Internet
– A phone modem converts computer data into an analog
audio signal for transfer over a telephone line, and then a
modem at the destination converts it back again into data
– A digital subscriber line (DSL) uses regular copper phone
lines to transfer digital data to and from the phone company’s
central office
– A cable modem uses the same line that your cable TV
signals come in on to transfer the data back and forth
15-14
Internet Connections
• Broadband A connection in which transfer
speeds are faster than 128 bits per second
– DSL connections and cable modems are broadband
connections
– The speed for downloads (getting data from the
Internet to your home computer) may not be the same
as uploads (sending data from your home computer
to the Internet)
15-15
Open Systems
• The International
Organization for
Standardization (ISO)
established the Open
Systems
Interconnection (OSI)
Reference Model
• Each layer deals with a
particular aspect of
network communication
Figure 15.5 The layers of the OSI Reference Model
15-16
Network Protocols
• Network protocols are layered such that
each one relies on the protocols that
underlie it
• Sometimes referred to as a protocol
stack
Figure 15.6 Layering of key network protocols
15-17
TCP/IP
• TCP stands for Transmission Control Protocol
TCP software breaks messages into packets,
hands them off to the IP software for delivery,
and then orders and reassembles the packets
at their destination
• IP stands for Internet Protocol
IP software deals with the routing of packets
through the maze of interconnected networks
to their final destination
15-18
TCP/IP (cont.)
• UDP stands for User Datagram Protocol
– It is an alternative to TCP
– The main difference is that TCP is highly
reliable, at the cost of decreased
performance, while UDP is less reliable, but
generally faster
15-19
High-Level Protocols
• Other protocols build on the foundation
established by the TCP/IP protocol suite
– Simple Mail Transfer Protocol (SMTP)
– File Transfer Protocol (FTP)
– Telnet
– Hyper Text Transfer Protocol (http)
15-20
Firewalls
• Firewall A machine and its software that
serve as a special gateway to a network,
protecting it from inappropriate access
– Filters the network traffic that comes in,
checking the validity of the messages as
much as possible and perhaps denying some
messages altogether
– Enforces an organization’s access control
policy
15-21
Firewalls
Figure 15.8 A firewall protecting a LAN
15-22
Network Addresses
• Hostname A unique identification that
specifies a particular computer on the
Internet
For example
matisse.csc.villanova.edu
condor.develocorp.com
15-23
Network Addresses
• Network software translates a hostname
into its corresponding IP address
For example
205.39.145.18
15-24
Domain Name System
• A hostname consists of the computer name
followed by the domain name
• csc.villanova.edu is the domain name
– A domain name is separated into two or more
sections that specify the organization, and possibly a
subset of an organization, of which the computer is a
part
– Two organizations can have a computer named the
same thing because the domain name makes it clear
which one is being referred to
15-25
Domain Name System
• The very last section of the domain is called its
top-level domain (TLD) name
Figure 15.10 Top-level domains, including some relatively new ones
15-26
Domain Name System
• Organizations based in countries other than the
United States use a top-level domain that
corresponds to their two-letter country codes
Figure 15.11
Some of the top-level domain
names based on country codes
15-27
Domain Name System
• The domain name system (DNS) is
chiefly used to translate hostnames into
numeric IP addresses
– DNS is an example of a distributed database
– If that server can resolve the hostname, it
does so
– If not, that server asks another domain name
server

Contenu connexe

Tendances

Hardware & networking
Hardware & networkingHardware & networking
Hardware & networkingAjay Mistry
 
One Computers Overview
One   Computers OverviewOne   Computers Overview
One Computers OverviewMISY
 
Introduction to computers MRS. SOWMYA JYOTHI
Introduction to computers MRS. SOWMYA JYOTHIIntroduction to computers MRS. SOWMYA JYOTHI
Introduction to computers MRS. SOWMYA JYOTHISowmya Jyothi
 
Computer hardware and networking
Computer hardware and networkingComputer hardware and networking
Computer hardware and networkingdevendrakhairwa
 
Introduction to Computer System
Introduction to Computer System Introduction to Computer System
Introduction to Computer System sonykhan3
 
Systems Administration - MARK JOHN LADO
Systems Administration - MARK JOHN LADOSystems Administration - MARK JOHN LADO
Systems Administration - MARK JOHN LADOMark John Lado, MIT
 
Report-computer hardware,system, and software
Report-computer hardware,system, and softwareReport-computer hardware,system, and software
Report-computer hardware,system, and softwareKarl John Piocos
 
Computer systems
Computer systemsComputer systems
Computer systemsJack Bishop
 
Input output devices
Input output devicesInput output devices
Input output devicessonykhan3
 
Office applications, internet, and the world wide web
Office applications, internet, and the world wide webOffice applications, internet, and the world wide web
Office applications, internet, and the world wide webWulax37
 
Year 10 ict computing essentials
Year 10 ict computing essentialsYear 10 ict computing essentials
Year 10 ict computing essentialsM'Lourdes Borg
 
an overview of computer
 an overview of computer an overview of computer
an overview of computersmartyaana
 
Computer system and network configuration
Computer system and network configurationComputer system and network configuration
Computer system and network configurationVon Alvarez
 
Jasmeet Chap 01 Intro To Computers
Jasmeet Chap 01 Intro To ComputersJasmeet Chap 01 Intro To Computers
Jasmeet Chap 01 Intro To Computerssharing notes123
 
Digital Literacy
Digital LiteracyDigital Literacy
Digital Literacymscuttle
 

Tendances (20)

Hardware & networking
Hardware & networkingHardware & networking
Hardware & networking
 
One Computers Overview
One   Computers OverviewOne   Computers Overview
One Computers Overview
 
Introduction to computers MRS. SOWMYA JYOTHI
Introduction to computers MRS. SOWMYA JYOTHIIntroduction to computers MRS. SOWMYA JYOTHI
Introduction to computers MRS. SOWMYA JYOTHI
 
OSI &TCP/IP Model
OSI &TCP/IP ModelOSI &TCP/IP Model
OSI &TCP/IP Model
 
Computer hardware and networking
Computer hardware and networkingComputer hardware and networking
Computer hardware and networking
 
Introduction to Computer System
Introduction to Computer System Introduction to Computer System
Introduction to Computer System
 
Systems Administration - MARK JOHN LADO
Systems Administration - MARK JOHN LADOSystems Administration - MARK JOHN LADO
Systems Administration - MARK JOHN LADO
 
Report-computer hardware,system, and software
Report-computer hardware,system, and softwareReport-computer hardware,system, and software
Report-computer hardware,system, and software
 
Computer systems
Computer systemsComputer systems
Computer systems
 
Input output devices
Input output devicesInput output devices
Input output devices
 
Chapter 01 (Discovering Computers)
Chapter 01 (Discovering Computers)Chapter 01 (Discovering Computers)
Chapter 01 (Discovering Computers)
 
Office applications, internet, and the world wide web
Office applications, internet, and the world wide webOffice applications, internet, and the world wide web
Office applications, internet, and the world wide web
 
Computer Basics and Hardware
Computer Basics and HardwareComputer Basics and Hardware
Computer Basics and Hardware
 
Year 10 ict computing essentials
Year 10 ict computing essentialsYear 10 ict computing essentials
Year 10 ict computing essentials
 
Chapter 7A Peter Norton
Chapter 7A Peter NortonChapter 7A Peter Norton
Chapter 7A Peter Norton
 
an overview of computer
 an overview of computer an overview of computer
an overview of computer
 
The Computer
The ComputerThe Computer
The Computer
 
Computer system and network configuration
Computer system and network configurationComputer system and network configuration
Computer system and network configuration
 
Jasmeet Chap 01 Intro To Computers
Jasmeet Chap 01 Intro To ComputersJasmeet Chap 01 Intro To Computers
Jasmeet Chap 01 Intro To Computers
 
Digital Literacy
Digital LiteracyDigital Literacy
Digital Literacy
 

Similaire à computer networking slides with full detail

Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--networksuhaimin othman
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--networkVinnu Vinod Kvk
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--networkkaran saini
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--networkAnchal doomra
 
Computer Network - Types & Definition
Computer Network - Types & DefinitionComputer Network - Types & Definition
Computer Network - Types & Definitionshreyarai297
 
Computer Network
Computer NetworkComputer Network
Computer NetworkHassan Khan
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--networkkaran saini
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--networkamare lakew
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--networkAyush Bhardwaj
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--networkAntenh Mekonen
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--networkBuntha Chhay
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--networkDuy Hoang Nguyen
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--networkSompal Duhan
 
Computer-Networks--Network.ppt
Computer-Networks--Network.pptComputer-Networks--Network.ppt
Computer-Networks--Network.pptSamiAAli44
 
Computer-Networks-fundamentals-concepts.ppt
Computer-Networks-fundamentals-concepts.pptComputer-Networks-fundamentals-concepts.ppt
Computer-Networks-fundamentals-concepts.pptashaks17
 
Computer-Networks--Network.ppt
Computer-Networks--Network.pptComputer-Networks--Network.ppt
Computer-Networks--Network.pptLeojOinam
 
Computer networks--network ppt
Computer networks--network pptComputer networks--network ppt
Computer networks--network pptAshokKumar3852
 

Similaire à computer networking slides with full detail (20)

Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
Computer Network - Types & Definition
Computer Network - Types & DefinitionComputer Network - Types & Definition
Computer Network - Types & Definition
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
TIL networks
TIL networksTIL networks
TIL networks
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
Computer-Networks--Network.ppt
Computer-Networks--Network.pptComputer-Networks--Network.ppt
Computer-Networks--Network.ppt
 
Computer-Networks-fundamentals-concepts.ppt
Computer-Networks-fundamentals-concepts.pptComputer-Networks-fundamentals-concepts.ppt
Computer-Networks-fundamentals-concepts.ppt
 
Computer-Networks--Network.ppt
Computer-Networks--Network.pptComputer-Networks--Network.ppt
Computer-Networks--Network.ppt
 
Computer networks--network ppt
Computer networks--network pptComputer networks--network ppt
Computer networks--network ppt
 
koushal networks.ppt
koushal networks.pptkoushal networks.ppt
koushal networks.ppt
 

Plus de sonykhan3

Algorithms and Data Structures
Algorithms and Data StructuresAlgorithms and Data Structures
Algorithms and Data Structuressonykhan3
 
computer visions with full detail
computer visions with full detail computer visions with full detail
computer visions with full detail sonykhan3
 
Deep learning-smaller neural network
Deep learning-smaller neural networkDeep learning-smaller neural network
Deep learning-smaller neural networksonykhan3
 
introduction to deep Learning with full detail
introduction to deep Learning with full detailintroduction to deep Learning with full detail
introduction to deep Learning with full detailsonykhan3
 
Information system and its types
Information system and its typesInformation system and its types
Information system and its typessonykhan3
 
Generation of computers
Generation of computersGeneration of computers
Generation of computerssonykhan3
 
Database management system
Database management systemDatabase management system
Database management systemsonykhan3
 
Computer software and operating system
Computer software and operating systemComputer software and operating system
Computer software and operating systemsonykhan3
 
computer language with full detail
computer language with full detail computer language with full detail
computer language with full detail sonykhan3
 
computer virus with full detail
computer virus with full detail computer virus with full detail
computer virus with full detail sonykhan3
 
Information Security
Information SecurityInformation Security
Information Securitysonykhan3
 

Plus de sonykhan3 (11)

Algorithms and Data Structures
Algorithms and Data StructuresAlgorithms and Data Structures
Algorithms and Data Structures
 
computer visions with full detail
computer visions with full detail computer visions with full detail
computer visions with full detail
 
Deep learning-smaller neural network
Deep learning-smaller neural networkDeep learning-smaller neural network
Deep learning-smaller neural network
 
introduction to deep Learning with full detail
introduction to deep Learning with full detailintroduction to deep Learning with full detail
introduction to deep Learning with full detail
 
Information system and its types
Information system and its typesInformation system and its types
Information system and its types
 
Generation of computers
Generation of computersGeneration of computers
Generation of computers
 
Database management system
Database management systemDatabase management system
Database management system
 
Computer software and operating system
Computer software and operating systemComputer software and operating system
Computer software and operating system
 
computer language with full detail
computer language with full detail computer language with full detail
computer language with full detail
 
computer virus with full detail
computer virus with full detail computer virus with full detail
computer virus with full detail
 
Information Security
Information SecurityInformation Security
Information Security
 

Dernier

call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceanilsa9823
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 

Dernier (20)

call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 

computer networking slides with full detail

  • 1. 15-1 Networking • Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually, the connections between computers in a network are made using physical wires or cables However, some connections are wireless, using radio waves or infrared signals
  • 2. 15-2 Networking • The generic term node or host refers to any device on a network • Data transfer rate The speed with which data is moved from one place on a network to another • Data transfer rate is a key issue in computer networks
  • 3. 15-3 Networking • Computer networks have opened up an entire frontier in the world of computing called the client/server model Figure 15.1 Client/Server interaction
  • 4. 15-4 Networking • File server A computer that stores and manages files for multiple users on a network • Web server A computer dedicated to responding to requests (from the browser client) for web pages
  • 5. 15-5 Types of Networks • Local-area network (LAN) A network that connects a relatively small number of machines in a relatively close geographical area
  • 6. 15-6 Types of Networks • Various configurations, called topologies, have been used to administer LANs – Ring topology A configuration that connects all nodes in a closed loop on which messages travel in one direction – Star topology A configuration that centers around one node to which all others are connected and through which all messages are sent – Bus topology All nodes are connected to a single communication line that carries messages in both directions
  • 7. Types of Networks • A bus technology called Ethernet has become the industry standard for local-area networks Figure 15.2 Various network topologies 15-10
  • 8. 15-8 Types of Networks • Wide-area network (WAN) A network that connects two or more local-area networks over a potentially large geographic distance Often one particular node on a LAN is set up to serve as a gateway to handle all communication going between that LAN and other networks Communication between networks is called internetworking The Internet, as we know it today, is essentially the ultimate wide-area network, spanning the entire globe
  • 9. 15-9 Types of Networks • Metropolitan-area network (MAN) The communication infrastructures that have been developed in and around large cities
  • 10. 15-10 So, who owns the Internet? Well, nobody does. No single person or company owns the Internet or even controls it entirely. As a wide-area network, it is made up of many smaller networks. These smaller networks are often owned and managed by a person or organization. The Internet, then, is really defined by how connections can be made between these networks.
  • 11. 15-11 Types of Networks Figure 15.1 Local-area networks connected across a distance to create a wide-area network
  • 12. 15-12 Internet Connections • Internet backbone A set of high-speed networks that carry Internet traffic These networks are provided by companies such as AT&T, GTE, and IBM • Internet service provider (ISP) A company that provides other companies or individuals with access to the Internet
  • 13. 15-13 Internet Connections • There are various technologies available that you can use to connect a home computer to the Internet – A phone modem converts computer data into an analog audio signal for transfer over a telephone line, and then a modem at the destination converts it back again into data – A digital subscriber line (DSL) uses regular copper phone lines to transfer digital data to and from the phone company’s central office – A cable modem uses the same line that your cable TV signals come in on to transfer the data back and forth
  • 14. 15-14 Internet Connections • Broadband A connection in which transfer speeds are faster than 128 bits per second – DSL connections and cable modems are broadband connections – The speed for downloads (getting data from the Internet to your home computer) may not be the same as uploads (sending data from your home computer to the Internet)
  • 15. 15-15 Open Systems • The International Organization for Standardization (ISO) established the Open Systems Interconnection (OSI) Reference Model • Each layer deals with a particular aspect of network communication Figure 15.5 The layers of the OSI Reference Model
  • 16. 15-16 Network Protocols • Network protocols are layered such that each one relies on the protocols that underlie it • Sometimes referred to as a protocol stack Figure 15.6 Layering of key network protocols
  • 17. 15-17 TCP/IP • TCP stands for Transmission Control Protocol TCP software breaks messages into packets, hands them off to the IP software for delivery, and then orders and reassembles the packets at their destination • IP stands for Internet Protocol IP software deals with the routing of packets through the maze of interconnected networks to their final destination
  • 18. 15-18 TCP/IP (cont.) • UDP stands for User Datagram Protocol – It is an alternative to TCP – The main difference is that TCP is highly reliable, at the cost of decreased performance, while UDP is less reliable, but generally faster
  • 19. 15-19 High-Level Protocols • Other protocols build on the foundation established by the TCP/IP protocol suite – Simple Mail Transfer Protocol (SMTP) – File Transfer Protocol (FTP) – Telnet – Hyper Text Transfer Protocol (http)
  • 20. 15-20 Firewalls • Firewall A machine and its software that serve as a special gateway to a network, protecting it from inappropriate access – Filters the network traffic that comes in, checking the validity of the messages as much as possible and perhaps denying some messages altogether – Enforces an organization’s access control policy
  • 21. 15-21 Firewalls Figure 15.8 A firewall protecting a LAN
  • 22. 15-22 Network Addresses • Hostname A unique identification that specifies a particular computer on the Internet For example matisse.csc.villanova.edu condor.develocorp.com
  • 23. 15-23 Network Addresses • Network software translates a hostname into its corresponding IP address For example 205.39.145.18
  • 24. 15-24 Domain Name System • A hostname consists of the computer name followed by the domain name • csc.villanova.edu is the domain name – A domain name is separated into two or more sections that specify the organization, and possibly a subset of an organization, of which the computer is a part – Two organizations can have a computer named the same thing because the domain name makes it clear which one is being referred to
  • 25. 15-25 Domain Name System • The very last section of the domain is called its top-level domain (TLD) name Figure 15.10 Top-level domains, including some relatively new ones
  • 26. 15-26 Domain Name System • Organizations based in countries other than the United States use a top-level domain that corresponds to their two-letter country codes Figure 15.11 Some of the top-level domain names based on country codes
  • 27. 15-27 Domain Name System • The domain name system (DNS) is chiefly used to translate hostnames into numeric IP addresses – DNS is an example of a distributed database – If that server can resolve the hostname, it does so – If not, that server asks another domain name server