introduction to computer network

Introduction to Computer Network

Nov 06, 2019

380 likes | 617 Views

Introduction to Computer Network. Dr. Rania R Ziedan. Agenda. Introduction Network types Network topology Network connection models OSI model. Computer network. A collection of computing devices that are connected in various ways in order to communicate and share resources or files

Share Presentation

  • client server
  • physical topology
  • client server model
  • fully connected mesh network

cadwell

Presentation Transcript

Introduction to Computer Network Dr. Rania R Ziedan

Agenda • Introduction • Network types • Network topology • Network connection models • OSI model

Computer network • A collection of computing devices that are connected in various ways in order to communicate and share resources or files • Wired network: the connections between computers in a network are made using physical wires or cables • Wireless network: the connections between computers in a network are made using radio waves or infrared signals

Computer network • Each computer in the network is known as: node or host • Data transfer rate: is the speed with which data is moved from one place on a network to another, which is a key feature in computer networks

Network Types • Local Area Network (LAN): two or more computers connected together, the computers are physically near each other (for example: in the same building) • LANs are inexpensive to install • LANs provide higher speeds

Network Types • Metropolitan Area Network (MAN): usually span tens of kilometers (for example: in the same city) • The cost of installation and operation is higher. • MANs use high-speed connections such as fiber optics to achieve higher speeds

Network Types • Wide Area Network (WAN): is a connection of LANs (for example : the Internet) • WANs span a larger area than a single city. • These use long distance telecommunication networks for connection, thereby increasing the cost.

The Internet • It is a large group of computers that are connected to each other and used to send information quickly between computers around the world

Physical topology of a network • The term physical topology refers to the way in which a network is laid out physically. • The topology of a network is the geometric representation of the relationship of all the links and linking devices • There are four basic topologies possible: mesh, star, bus, and ring

Physical topology of a network • Mesh Topology • In a mesh topology, every device has a dedicated point-to-point link to every other device. • The term dedicated means that the link carries traffic only between the two devices it connects. • The number of physical links in a fully connected mesh network with n nodes  n(n-1)/2 • The mesh topology used in the connection of telephone regionaloffices in which each regional office needs to be connected to every other regional office.

Physical topology of a network • Mesh Topology • Advantages: • Each link can carry its own data load, thus eliminating the traffic problems that can occur with shared links. • A mesh topology is robust. If one link becomes unusable, it does not incapacitate the entire system. • Every message travels along a dedicated line, only the intended recipient sees it. Physical boundaries prevent other users from gaining access to messages. • Point-to-point links make fault identification and fault isolation easy. Traffic can be routed to avoid links with suspected problems. • Disadvantage: • The amount of cabling and the number of I/O ports required.

Physical topology of a network • Star Topology • Each device has a dedicated point-to-point link only to a central controller, usually called a hub. • A star topology does not allow direct traffic between devices. • The controller acts as an exchange: If one device wants to send data to another, it sends the data to the controller, which then relays the data to the other connected device. • The star topology is used in local-area networks (LANs)

Physical topology of a network • Star Topology • Advantages: • less expensive than a mesh topology, each device needs only one link and one I/O port to connect it to any number of others. • Easy to install and reconfigure. • Robustness, if one link fails, only that link is affected, all other links remain active. • As long as the hub is working, it can be used to monitor link problems and bypass defective links • Disadvantage: • the dependency of the whole topology on one single point, the hub. If the hub goes down, the whole system is dead

Physical topology of a network • Bus Topology • A bus topology is multipoint connection. • One long cable acts as a backbone to link all the devices in a network. • Nodes are connected to the bus cable by drop lines and taps. • There is a limit on the number of taps a bus can support and on the distance between those taps. As a signal travels along the backbone, some of its energy is transformed into heat. Therefore, it becomes weaker and weaker as it travels farther and farther. • Bus topology was the one of the first topologies used in the design of early local area networks. • The cable has two end terminals that dampen the signal so that it does not keep moving from one end of the network to the other.

Physical topology of a network • Bus Topology • Advantages: • Ease of installation • Bus uses less cabling than mesh or star topologies. • Disadvantages: • Difficult reconnection and fault isolation. • Difficult to add new devices. • Signal reflection at the taps can cause degradation in quality. This degradation can be controlled by limiting the number and spacing of devices connected to a given length of cable. • Adding new devices may therefore require modification or replacement of the backbone. • In addition, a fault or break in the bus cable stops all transmission, even between devices on the same side of the problem. The damaged area reflects signals back in the direction of origin, creating noise in both directions.

Physical topology of a network • Ring Topology • Each device has a dedicated point-to-point connection with only the two devices on either side of it. • A signal is passed along the ring in one direction, from device to device, until it reaches its destination. • Each device in the ring incorporates a repeater. When a device receives a signal intended for another device, its repeater regenerates the bits and passes them along

Physical topology of a network • Ring Topology • Advantages: • easy to install and reconfigure • Fault isolation is simplified. • Generally in a ring, a signal is always circulating . If one device does not receive a signal within a specified period, it can issue an alarm. The alarm alerts the network operator to the problem and its location. • To add or delete a device requires changing only two connections. The only constraints are media and traffic considerations (maximum ring length and number of devices). • Disadvantages: • Unidirectional traffic • a break in the ring can disable the entire network. • This weakness can be solved by using a dual ring or a switch capable of closing off the break.

Network connection models • Networks can also be classified according to the roles that the networked computers play in the network’s operation. • Peer-to-peer, • server-based, • and client-based.

Network connection models Peer-to-peer model all computers are considered equal. Each computer controls its own information and is capable of functioning as either a client or a server depending upon the requirement. • Peer-to-peer networks are inexpensive and easy to install. • They are popular as home networks and for use in small companies. • Most operating systems come with built-in peer-to-peer networking capability. • The maximum number of peers that can operate on a peer-to-peer network is ten. • Each peer shares resources and allows others open access to them. • Shares can be document folders, printers, peripherals, and any other resource that they control on their computers.

Network connection models Peer-to-peer network

Network connection models • client-server model is a software that consists of two parts, client systems and server systems, both communicate over a computer network

Network connection models • The client-server relationship describes the relation between the client and how it makes a service request to the server, and how the server can accept these requests, process them, and return the requested information to the client

Page request How the Web Works? • WWW use classical client / server architecture • HTTP is text-based request-response protocol HTTP HTTP Server response Server running Web Server Software (IIS, Apache, etc.) Client running a Web Browser

Client/Server • There are two types of servers: • File serverA computer that stores and manages files for multiple users on a network • Web serverA computer that responds to requests for web pages (from the browser client)

Web servers and browsers • web server: software that listens for web page requests • Apache • Microsoft Internet Information Server (IIS) (part of Windows) • web browser: fetches/displays documents from web servers • Mozilla Firefox • Microsoft Internet Explorer (IE) • Apple Safari • Google Chrome • Opera

OSI Architecture The OSI 7-layer Model OSI – Open Systems Interconnection

Description of Layers • Physical Layer • Handles the transmission of raw bits over a communication link • Data Link Layer • Collects a stream of bits into a larger aggregate called a frame • Network adaptor and device drivers in OS implement the protocol in the datalink layer • Frames are actually delivered to hosts • Network Layer • Handles routing between nodes within a packet-switched network • Unit of data exchanged between nodes in this layer is called a packet The lower three layers are implemented on all network nodes

Description of Layers • Transport Layer • Implements a process-to-process channel • Unit of data exchanges in this layer is called a message • Session Layer • Provides a name space that is used to tie together the potentially different transport streams that are part of a single application • Presentation Layer • Concerned about the format of data exchanged between peers • Application Layer • Standardize common type of exchanges The transport layer and the higher layers typically run only on end-hosts and not on the intermediate switches and routers

Summary • A computer network consists of two or more computers that are connected and are able to communicate. • The basic purpose of networks is to enable effective communication, share resources, and facilitate centralized management of data. • Networks can be classified according to their geographical boundaries or their component roles. • The topology of a network is the geometric representation of the relationship of all the links and linking devices

Questions???

  • More by User

15-349 Introduction to Computer and Network Security

15-349 Introduction to Computer and Network Security

15-349 Introduction to Computer and Network Security. Iliano Cervesato 7 September 2008 – Beyond Encryption. Where we are. Course intro Cryptography Intro to crypto Modern crypto Symmetric encryption Asymmetric encryption Beyond encryption Cryptographic protocols Attacking protocols

620 views • 36 slides

15-349 Introduction to Computer and Network Security

15-349 Introduction to Computer and Network Security. Iliano Cervesato 14 September 2008 – Attacking Cryptographic Protocols. Where we are. Course intro Cryptography Intro to crypto Modern crypto Symmetric encryption Asymmetric encryption Beyond encryption Cryptographic protocols

413 views • 30 slides

15-349 Introduction to Computer and Network Security

15-349 Introduction to Computer and Network Security. Iliano Cervesato 26 August 2008 – Modern Cryptography. Where we are. Course intro Cryptography Intro to crypto Modern crypto Symmetric encryption Asymmetric encryption Beyond encryption Cryptographic protocols Attacking protocols

386 views • 23 slides

Computer and Network Security Introduction

Computer and Network Security Introduction

Computer and Network Security Introduction. Dr. Ron Rymon Efi Arazi School of Computer Science IDC, Herzliya. 2010/11. Today’s Lecture. Introduction A Few Nightmare Scenarios Statistics and Impact Course Plan and Administrativia Models of Computer Security.

587 views • 37 slides

15-349 Introduction to Computer and Network Security

15-349 Introduction to Computer and Network Security. Iliano Cervesato 24 August 2008 – Introduction to Cryptography. Where we are. Course intro Cryptography Intro to crypto Modern crypto Symmetric encryption Asymmetric encryption Beyond encryption Cryptographic protocols

457 views • 31 slides

INTRODUCTION TO COMPUTER & NETWORK SECURITY

INTRODUCTION TO COMPUTER & NETWORK SECURITY

INTRODUCTION TO COMPUTER & NETWORK SECURITY. Instructor: Dania Alomar. Why S tudy Security ?. Security threats are real… And need protection against Keeping information secure from modification and unauthorized access. Keeping it available is getting increasingly difficult.

1.08k views • 15 slides

INTRODUCTION TO COMPUTER

INTRODUCTION TO COMPUTER

INTRODUCTION TO COMPUTER . Lecture #10 COMPUTER SOFTWARE. By Shahid Naseem (Lecturer). COMPUTER SOFTWARE. A set of instructions given to the computer to solve a particular problem is called software. Software is also called computer program.

561 views • 12 slides

Introduction to Computer

Introduction to Computer

Introduction to Computer . Waqas Ali Sahito Lecturer Department of Computer Science. Subject Distribution. Theory 100 Marks Paper marks = 75 Sessional Marks = 25 Practical 50 Marks Objective = 10 Viva = 20 Sessional Marks = 20 Sessional Marks.

688 views • 41 slides

INTRODUCTION TO COMPUTER

INTRODUCTION TO COMPUTER . Lecture #12 FILES FORMAT. By Shahid Naseem (Lecturer). FILES. A collection of data or information that has a name , called the filename .

Introduction to Computer

By Kiramat Rahman Department of Computer & Software Technology. Introduction to Computer. Input / Output (I/O) devices Commonly used input devices Commonly used output devices Other concepts related to I/O devices. Outline. Provide means of communication between a computer

901 views • 61 slides

INTRODUCTION TO COMPUTER

INTRODUCTION TO COMPUTER. EVOLUTION OF THE COMPUTER. EVOLUTION OF THE COMPUTER. The history and evolution of computer are divided into two eras : before 1940 after 1940. BEFORE 1940. In the beginning, human do calculation by fingers, stones, small woods etc.

548 views • 8 slides

Introduction to Computer

Introduction to Computer. By: Maria Mullen. Objectives. Identify and use computer hardware Identify the pieces that make up the desktop Open and close desired programs Switch back and forth between open windows Create and save a document Print a document.

726 views • 23 slides

Introduction to computer

Introduction to computer

Introduction to computer. Submitted by : aashish.c ashish.m Abhijeet.g Ankit.j abhay.j . CONTENT. WHAT IS COMPUTER? WHY COMPUTER? COMPUTER COMPONENT DATA & INFORMATION

851 views • 32 slides

INTRODUCTION TO COMPUTER

INTRODUCTION TO COMPUTER. Lecture #15 ARRAYS. By Shahid Naseem (Lecturer). ARRAYS DEFINITION. An array is a sequence of objects of same data type. The objects in an array are also called “elements of array”.

347 views • 16 slides

INTRODUCTION TO COMPUTER

INTRODUCTION TO COMPUTER. Lecture #9 OPERATING SYSTEM. By Shahid Naseem (Lecturer). LECTURE OUTLINES. DATA. A collection of raw (unprepared or unprocessed) facts ( things, people, objects, events) and figures, collected for a specific purpose is called data.

375 views • 19 slides

Introduction to Computer and Network Architectures (Networks)

Introduction to Computer and Network Architectures (Networks)

Introduction to Computer and Network Architectures (Networks). Module introduction. Staff. Ivailo Chakarov- Module leader/tutor/Cisco Academy Director/Part man/part labrador [email protected]. Module content. Module assessment. The assessment for Networks part of the module is:

279 views • 8 slides

Introduction to Network

Introduction to Network

Introduction to Network. What is a Network?. A network consists of 2 or more computers connected together, and they can communicate and share resources (e.g. information). How many kinds of Networks?. Depending on one ’ s perspective, we can classify networks in different ways.

418 views • 26 slides

15-349 Introduction to Computer and Network Security

15-349 Introduction to Computer and Network Security. Iliano Cervesato 2 September 2008 – Public-key Encryption. Where we are. Course intro Cryptography Intro to crypto Modern crypto Symmetric encryption Asymmetric encryption Beyond encryption Cryptographic protocols

412 views • 27 slides

Introduction to COMPUTER

Introduction to COMPUTER

Introduction to COMPUTER. February 22, 2010. ADB Grant 0133-CAM: Public Financial Management in Rural Development Ministries (Component 1). AN INTRODUCTION TO COMPUTER TECHNOLOGY.

827 views • 31 slides

Introduction To Computer

Introduction To Computer

Introduction To Computer. Hardware. Mr. Garel. St. BACHS. What is a Computer?. a computer can be. defined as a machine for processing and storing information electronically. it must have a way for us to get information into the machine, and some way to get it out afterwards so we can

812 views • 13 slides

Introduction to Computer

Introduction to Computer. Computers are everywhere!. Computers are showing up everywhere you look, and even in places you can't see. Computers check out your groceries, pump your gas, dispense money at the ATM, turn the heat on and off, control the way your car runs. They're everywhere!.

1.16k views • 64 slides

Introduction to Computer

305171 Computer Programming Rattapoom Waranusast Department of Electrical and Computer Engineering Faculty of Engineering, Naresuan University. Introduction to Computer. What is computer?. A COMPUTER is an electronic device that can: Receive information Perform processes

1.69k views • 66 slides

SlidePlayer

  • My presentations

Auth with social network:

Download presentation

We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!

Presentation is loading. Please wait.

TYPES OF NETWORK.

Published by Devyn Pitman Modified over 10 years ago

Similar presentations

Presentation on theme: "TYPES OF NETWORK."— Presentation transcript:

TYPES OF NETWORK

Shape of a Network.

presentation on types of computer networks

Chapter 4 Computer Networks

presentation on types of computer networks

Data Communications and Networking

presentation on types of computer networks

COMPUTER NETWORK TOPOLOGIES

presentation on types of computer networks

Computer Network Topologies

presentation on types of computer networks

Networks & Components Discuss the components required for successful communications Explain the purpose of communications software Identify various sending.

presentation on types of computer networks

Nilesh Agre Wedashree Jalukar Neelima Shahi Group Members.

presentation on types of computer networks

INTRODUCTION TO COMPUTER NETWORKS Zeeshan Abbas. Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.

presentation on types of computer networks

Saeed Darvish Pazoki – MCSE, CCNA Abstracted From: Sybex – Network+ Study Guide Network Fundamentals 1.

presentation on types of computer networks

Network Topologies CS 1202.

presentation on types of computer networks

NETWORK TOPOLOGIES The pattern of interconnection of nodes in a network is called the Topology. The selection of a topology depends on Cost. For a network.

presentation on types of computer networks

Shalini Bhavanam. Key words: Basic Definitions Classification of Networks Types of networks Network Topologies Network Models.

presentation on types of computer networks

1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.

presentation on types of computer networks

Network topology.

presentation on types of computer networks

1 Chapter 10 Introduction to Metropolitan Area Networks and Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.

presentation on types of computer networks

Introduction to Metropolitan Area Networks and Wide Area Networks TDC 362 / TDC 460.

presentation on types of computer networks

Copyright©2008 N.AlJaffan®KSU1 Chapter 8 Communications and Networks.

presentation on types of computer networks

Core 3: Communication Systems. On any network there are two types of computers present – servers and clients. By definition Client-Server architecture.

presentation on types of computer networks

INTRODUCTION TO COMPUTER NETWORKS INTRODUCTION Lecture # 1 (

presentation on types of computer networks

COMPUTER NETWORKS.

About project

© 2024 SlidePlayer.com Inc. All rights reserved.

If you're seeing this message, it means we're having trouble loading external resources on our website.

If you're behind a web filter, please make sure that the domains *.kastatic.org and *.kasandbox.org are unblocked.

To log in and use all the features of Khan Academy, please enable JavaScript in your browser.

Computers and the Internet

Course: computers and the internet   >   unit 3, computer networks.

  • Wires, cables, and WiFi
  • Physical network connections
  • Bit rate, bandwidth, and latency
  • Bit rate and bandwidth

presentation on types of computer networks

Building a network

Types of networks.

  • (Choice A)   DCN A DCN
  • (Choice B)   WAN B WAN
  • (Choice C)   LAN C LAN

Networking protocols

Want to join the conversation.

  • Upvote Button navigates to signup page
  • Downvote Button navigates to signup page
  • Flag Button navigates to signup page

Good Answer

  • Engineering Mathematics
  • Discrete Mathematics
  • Operating System
  • Computer Networks
  • Digital Logic and Design
  • C Programming
  • Data Structures
  • Theory of Computation
  • Compiler Design
  • Computer Org and Architecture

Basics of Computer Networking

  • Types of Network Topology
  • Transmission Modes in Computer Networks (Simplex, Half-Duplex and Full-Duplex)
  • Manchester Encoding in Computer Network
  • Difference between Broadband and Baseband Transmission
  • What is OSI Model? - Layers of OSI Model
  • TCP/IP Model
  • Multiple Access Protocols in Computer Network
  • Framing in Data Link Layer
  • What is Ethernet?
  • Ethernet Frame Format
  • Token Ring frame format
  • Difference between Byte stuffing and Bit stuffing
  • Hamming Code in Computer Network
  • Back-off Algorithm for CSMA/CD
  • Collision Detection in CSMA/CD
  • Efficiency of CSMA/CD
  • Efficiency Of Token Ring
  • Stop and Wait ARQ
  • Sliding Window Protocol | Set 1 (Sender Side)
  • What is MAC Address?
  • Collision Avoidance in wireless networks
  • Difference between Unicast, Broadcast and Multicast in Computer Network
  • Collision Domain and Broadcast Domain in Computer Network
  • Introduction of Classful IP Addressing

Computer Networking is the practice of connecting computers together to enable communication and data exchange between them. In general, Computer Network is a collection of two or more computers. It helps users to communicate more easily. In this article, we are going to discuss the basics which everyone must know before going deep into Computer Networking. 

Computer Networking

Computer Networking

How Does a Computer Network Work?

Basics building blocks of a Computer network are Nodes and Links. A Network Node can be illustrated as Equipment for Data Communication like a Modem, Router, etc., or Equipment of a Data Terminal like connecting two computers or more. Link in Computer Networks can be defined as wires or cables or free space of wireless networks.

The working of Computer Networks can be simply defined as rules or protocols which help in sending and receiving data via the links which allow Computer networks to communicate. Each device has an IP Address, that helps in identifying a device.

Basic Terminologies of Computer Networks

  • Network: A network is a collection of computers and devices that are connected together to enable communication and data exchange.
  • Nodes: Nodes are devices that are connected to a network. These can include computers, Servers, Printers, Routers, Switches , and other devices.
  • Protocol: A protocol is a set of rules and standards that govern how data is transmitted over a network. Examples of protocols include TCP/IP , HTTP , and FTP .
  • Topology: Network topology refers to the physical and logical arrangement of nodes on a network. The common network topologies include bus, star, ring, mesh, and tree.
  • Service Provider Networks: These types of Networks give permission to take Network Capacity and Functionality on lease from the Provider. Service Provider Networks include Wireless Communications, Data Carriers, etc.
  • IP Address : An IP address is a unique numerical identifier that is assigned to every device on a network. IP addresses are used to identify devices and enable communication between them.
  • DNS: The Domain Name System (DNS) is a protocol that is used to translate human-readable domain names (such as www.google.com) into IP addresses that computers can understand.
  • Firewall: A firewall is a security device that is used to monitor and control incoming and outgoing network traffic. Firewalls are used to protect networks from unauthorized access and other security threats.

Types of Enterprise Computer Networks

  • LAN: A Local Area Network (LAN) is a network that covers a small area, such as an office or a home. LANs are typically used to connect computers and other devices within a building or a campus.
  • WAN: A Wide Area Network (WAN) is a network that covers a large geographic area, such as a city, country, or even the entire world. WANs are used to connect LANs together and are typically used for long-distance communication.
  • Cloud Networks: Cloud Networks can be visualized with a Wide Area Network (WAN) as they can be hosted on public or private cloud service providers and cloud networks are available if there is a demand. Cloud Networks consist of Virtual Routers, Firewalls, etc.

These are just a few basic concepts of computer networking. Networking is a vast and complex field, and there are many more concepts and technologies involved in building and maintaining networks. Now we are going to discuss some more concepts on Computer Networking.

  • Open system:  A system that is connected to the network and is ready for communication. 
  • Closed system:  A system that is not connected to the network and can’t be communicated with.

Types of Computer Network Architecture

Computer Network falls under these broad Categories:

  • Client-Server Architecture: Client-Server Architecture is a type of Computer Network Architecture in which Nodes can be Servers or Clients. Here, the server node can manage the Client Node Behaviour.
  • Peer-to-Peer Architecture: In P2P (Peer-to-Peer) Architecture , there is not any concept of a Central Server. Each device is free for working as either client or server.

Network Devices

An interconnection of multiple devices, also known as hosts, that are connected using multiple paths for the purpose of sending/receiving data or media. Computer networks can also include multiple devices/mediums which help in the communication between two different devices; these are known as Network devices and include things such as routers, switches, hubs, and bridges. 

Network Devices

Network Topology

The Network Topology is the layout arrangement of the different devices in a network. Common examples include Bus, Star, Mesh, Ring, and Daisy chain. 

Network Topology

OSI Model  

OSI stands for Open Systems Interconnection . It is a reference model that specifies standards for communications protocols and also the functionalities of each layer. The OSI has been developed by the International Organization For Standardization and it is 7 layer architecture. Each layer of OSI has different functions and each layer has to follow different protocols. The 7 layers are as follows: 

  • Physical Layer
  • Data link Layer
  • Network Layer
  • Transport Layer
  • Session Layer
  • Presentation Layer
  • Application Layer

A protocol is a set of rules or algorithms which define the way how two entities can communicate across the network and there exists a different protocol defined at each layer of the OSI model. A few such protocols are TCP, IP, UDP, ARP, DHCP, FTP, and so on. 

Unique Identifiers of Network 

Hostname: Each device in the network is associated with a unique device name known as Hostname. Type “hostname” in the command prompt(Administrator Mode) and press ‘Enter’, this displays the hostname of your machine.   

HostName

IP Address (Internet Protocol address):   Also known as the Logical Address, the IP Address is the network address of the system across the network. To identify each device in the world-wide-web, the Internet Assigned Numbers Authority (IANA) assigns an IPV4 (Version 4) address as a unique identifier to each device on the Internet. The length of an IPv4 address is 32 bits, hence, we have 2 32 IP addresses available. The length of an IPv6 address is 128 bits.

In Windows Type “ipconfig” in the command prompt and press ‘Enter’, this gives us the IP address of the device. For Linux, Type “ifconfig” in the terminal and press ‘Enter’ this gives us the IP address of the device.

MAC Address (Media Access Control address):  Also known as physical address, the MAC Address is the unique identifier of each host and is associated with its NIC (Network Interface Card) . A MAC address is assigned to the NIC at the time of manufacturing. The length of the MAC address is: 12-nibble/ 6 bytes/ 48 bits Type “ipconfig/all” in the command prompt and press ‘Enter’, this gives us the MAC address. 

Port:  A port can be referred to as a logical channel through which data can be sent/received to an application. Any host may have multiple applications running, and each of these applications is identified using the port number on which they are running. 

A port number is a 16-bit integer, hence, we have 2 16 ports available which are categorized as shown below: 

Number of ports: 65,536  Range: 0 – 65535  Type “ netstat -a ” in the command prompt and press ‘Enter’, this lists all the ports being used. 

List of Ports

List of Ports

Socket:  The unique combination of IP address and Port number together is termed a Socket. 

Other Related Concepts 

DNS Server:   DNS stands for Domain Name System . DNS is basically a server that translates web addresses or URLs (ex: www.google.com) into their corresponding IP addresses. We don’t have to remember all the IP addresses of each and every website. The command ‘ nslookup ’ gives you the IP address of the domain you are looking for. This also provides information on our DNS Server. \

Domain IP Address

Domain IP Address

ARP:   ARP stands for Address Resolution Protocol . It is used to convert an IP address to its corresponding physical address(i.e., MAC Address). ARP is used by the Data Link Layer to identify the MAC address of the Receiver’s machine. 

RARP:   RARP stands for Reverse Address Resolution Protocol . As the name suggests, it provides the IP address of the device given a physical address as input. But RARP has become obsolete since the time DHCP has come into the picture.

Please Login to comment...

Similar reads, improve your coding skills with practice.

 alt=

What kind of Experience do you want to share?

Illustration showing abstract representation of computing network

A computer network comprises two or more computers that are connected—either by cables (wired) or wifi (wireless)—with the purpose of transmitting, exchanging, or sharing data and resources.

You build a computer network by using hardware (for example, routers, switches, access points, and cables) and software (for example, operating systems or business applications).

Geographic location often defines a computer network. For example, a LAN (local area network) connects computers in a defined physical space, like an office building, whereas a WAN (wide area network) can connect computers across continents. The internet is the largest example of a WAN, connecting billions of computers worldwide.

You can further define a computer network by the protocols it uses to communicate, the physical arrangement of its components, how it controls traffic, and its purpose.

Computer networks enable communication for every business, entertainment, and research purpose. The internet, online search, email, audio and video sharing, online commerce, live-streaming, and social networks all exist because of computer networks.

Read how desktop as a service (DaaS) enables enterprises to achieve the same level of performance and security as deploying the applications on premises.

Register for the guide on app modernization

As networking needs evolved, so did the computer network types that serve those needs. Here are the most common and widely used computer network types:

LAN (local area network):  A LAN connects computers over a relatively short distance, allowing them to share data, files, and resources. For example, a LAN may connect all the computers in an office building, school, or hospital. Typically, LANs are privately owned and managed.  

WLAN (wireless local area network):  A WLAN is just like a LAN but connections between devices on the network are made wirelessly.  

WAN (wide area network):  As the name implies, a WAN connects computers over a wide area, such as from region to region or even continent to continent. The internet is the largest WAN, connecting billions of computers worldwide. You will typically see collective or distributed ownership models for WAN management.  

MAN (metropolitan area network):  MANs are typically larger than LANs but smaller than WANs. Cities and government entities typically own and manage MANs.  

PAN (personal area network):  A PAN serves one person. For example, if you have an iPhone and a Mac, it’s likely you’ve set up a PAN that shares and syncs content—text messages, emails, photos, and more—across both devices.  

SAN (storage area network):  A SAN is a specialized network that provides access to block-level storage—shared network or cloud storage. To the user, it looks, and works like a storage drive that’s physically attached to a computer. (For more information on how a SAN works with block storage, see Block Storage: A Complete Guide ).  

CAN (campus area network):  A CAN is also known as a corporate area network. A CAN is larger than a LAN but smaller than a WAN. CANs serve sites such as colleges, universities, and business campuses.  

VPN (virtual private network): A VPN is a secure, point-to-point connection between two network end points (see ‘nodes’ below). A VPN establishes an encrypted channel that keeps a user’s identity and access credentials, as well as any data transferred, inaccessible to hackers.

The following are some common terms to know when discussing computer networking:

IP address : An IP address is a unique number assigned to every device connected to a network that uses the Internet Protocol for communication. Each IP address identifies the device’s host network and the location of the device on the host network. When one device sends data to another, the data includes a ‘header’ that includes the IP address of the sending device and the IP address of the destination device.  

Nodes : A node is a connection point inside a network that can receive, send, create, or store data. Each node requires you to provide some form of identification to receive access, like an IP address. A few examples of nodes include computers, printers, modems, bridges, and switches. A node is essentially any network device that can recognize, process, and transmit information to any other network node.  

Routers : A router is a physical or virtual device that sends information that is contained in data packets between networks. Routers analyze data within the packets to determine the best way for the information to reach its ultimate destination. Routers forward data packets until they reach their destination node.  

Switches : A switch is a device that connects other devices and manages node-to-node communication within a network, ensuring that data packets reach their ultimate destination. While a router sends information between networks, a switch sends information between nodes in a single network. When discussing computer networks, ‘switching’ refers to how data is transferred between devices in a network. The three main types of switching are as follows:

Circuit switching , which establishes a dedicated communication path between nodes in a network. This dedicated path assures the full bandwidth is available during the transmission, meaning that no other traffic can travel along that path.  

Packet switching involves breaking down data into independent components that are called packets, which because of their small size, make fewer demands on the network. The packets travel through the network to their end destination.  

Message switching sends a message in its entirety from the source node, traveling from switch to switch until it reaches its destination node.  

Ports : A port identifies a specific connection between network devices. Each port is identified by a number. If you think of an IP address as comparable to the address of a hotel, then ports are the suites or room numbers within that hotel. Computers use port numbers to determine which application, service, or process should receive specific messages.  

Network cable types : The most common network cable types are Ethernet twisted pair, coaxial, and fiber optic. The choice of cable type depends on the size of the network, the arrangement of network elements, and the physical distance between devices.

The wired or wireless connection of two or more computers for the purpose of sharing data and resources form a computer network. Today, nearly every digital device belongs to a computer network.

In an office setting, you and your colleagues may share access to a printer or to a group messaging system. The computing network that allows this is likely a LAN or local area network that permits your department to share resources.

A city government might manage a city-wide network of surveillance cameras that monitor traffic flow and incidents. This network would be part of a MAN or metropolitan area network that allows city emergency personnel to respond to traffic accidents, advise drivers of alternate travel routes. And even send traffic tickets to drivers who run red lights.

The Weather Company worked to create a peer-to-peer mesh network that allows mobile devices to communicate directly with other mobile devices without requiring wifi or cellular connectivity. The Mesh Network Alerts  project allows the delivery of life-saving weather information to billions of people, even without an internet connection.

The internet is actually a network of networks that connects billions of digital devices worldwide. Standard protocols allow communication between these devices. Those protocols include the hypertext transfer protocol (the ‘http’ in front of all website addresses). Internet protocols (or IP addresses) are the unique identifying numbers that are required of every device that accesses the internet. IP addresses are comparable to your mailing address, providing unique location information so that information can be delivered correctly.

Internet Service Providers (ISPs) and Network Service Providers (NSPs) provide the infrastructure that allows the transmission of packets of data or information over the internet. Every bit of information that is sent over the internet doesn’t go to every device connected to the internet. It’s the combination of protocols and infrastructure that tells information exactly where to go.

Computer networks connect nodes like computers, routers, and switches by using cables, fiber optics, or wireless signals. These connections allow devices in a network to communicate and share information and resources.

Networks follow protocols, which define how communications are sent and received. These protocols allow devices to communicate. Each device on a network uses an Internet Protocol or IP address, a string of numbers that uniquely identifies a device and allows other devices to recognize it. 

Routers are virtual or physical devices that facilitate communications between different networks. Routers analyze information to determine the best way for data to reach its ultimate destination. Switches connect devices and manage node-to-node communication inside a network, ensuring that bundles of information traveling across the network reach their ultimate destination.

Computer network architecture defines the physical and logical framework of a computer network. It outlines how computers are organized in the network and what tasks are assigned to those computers. Network architecture components include hardware, software, transmission media (wired or wireless), network topology, and communications protocols.

Main types of network architecture

There are two types of network architecture:  peer-to-peer (P2P) and client/server . In P2P architecture, two or more computers are connected as “peers,” meaning that they have equal power and privileges on the network. A P2P network does not require a central server for coordination. Instead, each computer on the network acts as both a client (a computer that needs to access a service) and a server (a computer that serves the needs of the client accessing a service). Each peer makes some of its resources available to the network, sharing storage, memory, bandwidth, and processing power.

In a client/server network, a central server or group of servers manage resources and deliver services to client devices in the network. The clients in the network communicate with other clients through the server. Unlike the P2P model, clients in a client/server architecture don’t share their resources. This architecture type is sometimes called a tiered model because it's designed with multiple levels or tiers.

Network topology

Network topology refers to how the nodes and links in a network are arranged. A network node is a device that can send, receive, store, or forward data. A network link connects nodes and may be either cabled or wireless links.

Understanding topology types provides the basis for building a successful network. There are several topologies but the most common are bus, ring, star, and mesh:

A bus network topology is when every network node is directly connected to a main cable.  

In a ring topology , nodes are connected in a loop, so each device has exactly two neighbors. Adjacent pairs are connected directly; nonadjacent pairs are connected indirectly through multiple nodes.  

In a star network topology , all nodes are connected to a single, central hub and each node is indirectly connected through that hub.  

A mesh topology is defined by overlapping connections between nodes. You can create a full mesh topology, where every node in the network is connected to every other node. You can also create partial mesh topology in which only some nodes are connected to each other and some are connected to the nodes with which they exchange the most data. Full mesh topology can be expensive and time-consuming to run, which is why it's often reserved for networks that require high redundancy. Partial mesh provides less redundancy but is more cost-effective and simpler to run.

Computer network security protects the integrity of information that is contained by a network and controls who access that information. Network security policies balance the need to provide service to users with the need to control access to information.

There are many entry points to a network. These entry points include the hardware and software that comprise the network itself as well as the devices used to access the network, like computers, smartphones, and tablets. Because of these entry points, network security requires using several defense methods. Defenses may include firewalls—devices that monitor network traffic and prevent access to parts of the network based on security rules.

Processes for authenticating users with user IDs and passwords provide another layer of security. Security includes isolating network data so that proprietary or personal information is harder to access than less critical information. Other network security measures include ensuring hardware and software updates and patches are performed regularly. This educates network users about their role in security processes, and staying aware of external threats executed by hackers and other malicious actors. Network threats constantly evolve, which makes network security a never-ending process.

The use of public cloud also requires updates to security procedures to ensure continued safety and access. A secure cloud demands a secure underlying network. 

Read about the top five considerations  for securing the public cloud.

As noted above, a mesh network is a topology type in which the nodes of a computer network connect to as many other nodes as possible. In this topology, nodes cooperate to efficiently route data to its destination. This topology provides greater fault tolerance because if one node fails, there are many other nodes that can transmit data. Mesh networks self-configure and self-organize, searching for the fastest, most reliable path on which to send information.

Type of mesh networks:

There are two types of mesh networks—full mesh and partial mesh.

  • In a full mesh topology , every network node connects to every other network node, providing the highest level of fault tolerance. However, it costs more to run. In a partial mesh topology, only some nodes connect, typically those that exchange data most frequently.
  • A wireless mesh network may consist of tens to hundreds of nodes. This type of network connects to users over access points spread across a large area.

Load balancers efficiently distribute tasks, workloads, and network traffic across available servers. Think of load balancers like air traffic control at an airport. The load balancer observes all traffic coming into a network and directs it toward the router or server that is best equipped to manage it. The objectives of load balancing are to avoid resource overload, optimize available resources, improve response times, and maximize throughput.

For a complete overview of load balancers, see Load Balancing: A Complete Guide .

A content delivery network (CDN) is a distributed server network that delivers temporarily stored, or cached, copies of website content to users based on the user’s geographic location. A CDN stores this content in distributed locations and serves it to users as a way to reduce the distance between your website visitors and your website server. Having cached content closer to your end users allows you to serve content faster and helps websites better reach a global audience. CDNs protect against traffic surges, reduce latency, decrease bandwidth consumption, accelerate load times. And lessen the impact of hacks and attacks by introducing a layer between the end user and your website infrastructure.

Live-streaming media, on-demand media, gaming companies, application creators, e-commerce sites—as digital consumption increases, more content owners turn to CDNs to better serve content consumers.

Avoid network traffic jams and decrease latency by keeping your data closer to your users with Akamai’s content delivery network on IBM Cloud®.

IBM Cloud® Load Balancers enable you to balance traffic among servers to improve uptime and performance.

Gain more control of your cloud infrastructure and protect your servers and network.

IBM Hybrid Cloud Mesh offers simple, secure, and predictable application-centric connectivity.

Learn how load balancing optimizes website and application performance.

An introduction to content delivery networks and how they improve customer satisfaction by optimizing website and mobile app performance.

Answers to pressing questions from IT architects on public cloud security.

IBM NS1 Connect provides fast, secure connections to users anywhere in the world with premium DNS and advanced, customizable traffic steering. NS1 Connect’s always-on, API-first architecture enables your IT teams to more efficiently monitor networks, deploy changes and conduct routine maintenance.

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

Enter the email address you signed up with and we'll email you a reset link.

  • We're Hiring!
  • Help Center

paper cover thumbnail

INTRODUCTION TO COMPUTER NETWORKS

Profile image of Mohammed Najm Abdullah  Al Salam

Related Papers

Santi Ngoran

presentation on types of computer networks

Siyazini Vhutuzah

Qsn no. 15 is your written assignment due September and 16 is your presentation qsn due next block. Question 1 a) Explain the ethical and societal challenges one can face when using Information Technology? [10] • Intellectual property-Millions of dollars of software is illegally copied each year all over the world. This phenomenon has a great impact on the software industry in the region. Local and foreign software industries need consumers support all over the world to maintain the progress of technology. Most importantly, for the sake of growth in indigenous ICT innovation and invention, local software industries in Asia-Pacific need local support in protecting their intellectual property rights and investment • Crime-Stolen and counterfeit ATM cards are used to steal millions of dollars each year throughout the region. The anonymity of the machines makes some crimes easier and creates many new types of crimes. • Loss of privacy-Transactions are transmitted and recorded in databases at banks, hospitals, shopping complexes, and various organizations, in the public or private sector. The contents of electronic communications and databases can provide important and private information to unauthorised individuals and organizations if they are not securely guarded. • Errors-Information input into the databases is prone to human and device error. Computer programmes that process the information may contain thousands of errors. These errors can create wrong and misleading information about individuals and organizations. Information and programme errors might result in financial loss, or even the loss of lives. • Freedom of speech and press-How do the constitutional rights of individuals in terms of the freedoms of speech and press apply to electronic media? How seriously do the problems of pornography, harassment, libel, and censorship on the net affect individuals and society? What government initiatives have been used in handling this crisis? • Digital Divide-How does ICT affect local community life? The increasing use of computers has increased the 0 0 9 3 0 0 9 4 0 0 9 3 0 0 9 4 separation of rich and poor, creating a digital divide between the information haves and have-nots. What subsidies and programmes have been provided by governments of the region to address the issue? • Unemployment-The automation of work has caused creative destruction by eliminating some vocations and creating new ones. How does this affect the employment or unemployment of the work force of a nation? • Professional Ethics-How well trained and ethical are our ICT professionals in dispensing their duties? Faulty and useless systems that cause disasters and hardships to users might be built by incompetent ICT professionals. In dispensing their duties ICT professionals must demonstrate their best practices and standards as set by professional bodies for quality assurance. b) List and explain factors you would consider before buying computer hardware [10] • Warranty

Ata Ul Munim Aseel Shaikh

Neeraj Kumar

Odhiambo Thomas

Inncoent Unwujo

Computer networks are a system of interconnected computers for the purpose of sharing digital information. Two kinds of peers’ relationship are usually considered for reputation management in P2P network. One of them is direct trust relationship that the reputation is got with two peers interacting directly; the other is recommendation trust that the reputation is got by recommendation of the third party. In this paper, we presented an improved trust model based on recommended in P2P environment. In order to weight the transaction reputation and recommendation reputation, we introduced a risk value which resists the influence of false recommendation and collaborative cheating from malicious peers. The global reputation value of target peer can be calculated by using the different portions of transaction reputation, recommendation reputation and risk value Keywords: Network, LAN, Computer, operating system, wifi, connectivity,

Adewale Ademola

endris geta

International Journal for Research in Applied Science and Engineering Technology -IJRASET

IJRASET Publication

Computer networks have become increasingly everywhere. In today's world, a computer network is much more than a collected works of interconnected devices. Computer networks are a system of interconnected computers for the purpose of transferring digital information. Networking not only helps in communication the data but also to share the available resources, to share the information, to send and receive emails, to update and analyses the data to reduce the cost and so on. The computer network enables to analyze, organize and disseminate the information that is essential to profitability. This paper provides information about different types of network. In this review paper we are presenting the basic concepts of network, network architecture and network type's i.e. LAN, MAN and WAN with its advantages and disadvantages.

Loading Preview

Sorry, preview is currently unavailable. You can download the paper by clicking the button above.

RELATED PAPERS

Mancharagopan Ponnampalam

virendra thoke

catherine salazar

Edwin Ndiema , Dorothy Apondi Rambim

RELATED TOPICS

  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2024

IMAGES

  1. Types of computer network.

    presentation on types of computer networks

  2. PPT

    presentation on types of computer networks

  3. The Basics of Computer Networking

    presentation on types of computer networks

  4. PPT

    presentation on types of computer networks

  5. SOLUTION: Introduction to computer networks ppt 1

    presentation on types of computer networks

  6. PPT ON COMPUTER NETWORK AND IT'S TYPES

    presentation on types of computer networks

VIDEO

  1. What_is_Business_Plan_Presentation____Types_of_Business_Plan_Presentation___meaning_of_Business_Plan

  2. #5 Variables & Data Types || Computer Programming for Computer Science

  3. What is Business Plan Presentation || Types of Business Plan Presentation

  4. Computer All Generation types . computer hardware course

  5. Introduction to switching || and their types || Computer networks

  6. Presentation on Computer Networking

COMMENTS

  1. Computer network ppt

    Computer network ppt. A computer network connects multiple computers and devices to allow communication and sharing of resources. There are different types of networks including local area networks (LANs) within a single building, metropolitan area networks (MANs) within a city, and wide area networks (WANs) across large distances like countries.

  2. Types of computer network

    There are several types of computer networks: - Local area networks (LANs) connect devices within a small geographic area like a home or office using technologies like Ethernet or WiFi. - Metropolitan area networks (MANs) connect devices within a city using technologies like DSL or cable. - Wide area networks (MANs) connect LANs over long ...

  3. Presentation on computer networking

    3. Computer network A computer network is a system of interconnected computers and peripheral devices. For example, it may connect computers, printers, scanners and cameras. Computer network communication We transmit information or data by using two types of signals, namely analog and digital.

  4. PDF TYPES OF COMPUTER NETWORKS

    Personal Area Network (PAN) •A personal area network (PAN) is a computer network used for communication among computer devices, including telephones and personal digital assistants, in proximity to an individual's body. •The devices may or may not belong to the person in question. The reach of a PAN is typically a few meters.

  5. PDF Lecture 13: Introduction to Networking

    Lecture 13: Introduction to Networking Networking is simply communicating between two computers connected on a network. You can actually set up a network connection on a single computer, as well. A network requires one computer to act as the server , waiting patiently for an incoming connection from another computer, the client .

  6. PPT

    380 likes | 592 Views. Introduction to Computer Network. Dr. Rania R Ziedan. Agenda. Introduction Network types Network topology Network connection models OSI model. Computer network. A collection of computing devices that are connected in various ways in order to communicate and share resources or files. Download Presentation.

  7. D 1.2 TYPES OF NETWORKS.ppt

    Is the largest network of all network types. 2. The internet is the largest WAN in the world. 3. WAN generally covers large distances such as states, countries or continents. 4. WAN is group of MANs or LANs or the mixture of both network. 5. An example in the society using WAN is the banking organization.

  8. D 1.2 TYPES OF NETWORKS.ppt

    1 TYPES OF NETWORKS Three types of networks: 1. Local Area Network (LAN) 2. Metropolitan Area Network (MAN) 3. Wide Area Network (WAN) 2 LAN Local Area NEtwork. . 1.Covers a small region of space, typically a single building. .

  9. PDF CSE 461: Computer Networks

    To learn the fundamentals of computer networks 2. Learn how the Internet works • What really happens when you "browse the web"? • TCP/IP, DNS, HTTP, NAT, VPNs, 802.11 etc. 3. Understand why the internet is designed how it is designed • SDN, Load Balancers, Architectures.

  10. PDF Networking Fundamentals

    • A network refers to two or more connected computers that can share resources such as data, a printer, an Internet connection, applications, or a combination of these ... Presentation Session Transport Network Data Link ... MAN and WAN networks • Possible media types for LAN and WAN connections

  11. TYPES OF COMPUTER NETWORKS

    The computers on a network may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams. 3 Different Types of Networks. Depending upon the geographical area covered by a network, it is classified as: Local Area Network (LAN) Metropolitan Area Network (MAN) Wide Area Network (WAN) Personal Area Network (PAN)

  12. INTRODUCTION TO COMPUTER NETWORKS

    1 INTRODUCTION TO COMPUTER NETWORKS. 2 Two or more computers or communications devices connected by transmission media and channels and guided by a set of rules for communication purposes that allow users to communicate with each other and share applications and data. Information Technology Center.

  13. PDF Introduction to computer networking

    A network can be defined as two or more computers connected together in such a way that they can share resources. The purpose of a network is to share resources. resource may be: A file. A folder. A printer. A disk drive Or just about anything else that exists on a computer.

  14. PDF Chapter 7 Networking: Connecting Computing Devices

    •Computer network -Two or more computers connected together -Devices connected to networks: nodes •Benefits of a network ... - How much money you can spend on your network Comparing the Major Types of Home Networks Wired Ethernet Power-Line Wireless 802.11g Wireless 802.11n Maximum data transfer rate (bandwidth) 100 Mbps to

  15. TYPES OF NETWORK.

    1 TYPES OF NETWORK. 2 A computer network, often simply referred to as a network, is a collection of computers and devices interconnected by communications channels that facilitate communications among users and allows users to share resources. 3 LAN - Local Area Network. A LAN connects network devices over a relatively short distance.

  16. Types of network

    This document discusses three types of computer networks: local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). LANs connect computers within a limited local area like a home or single building. MANs operate within a larger area like a city using technologies like fiber cables and satellites.

  17. Types of Computer Networks

    These are explained below. 1. Personal Area Network (PAN) PAN is the most basic type of computer network. This network is restrained to a single person, that is, communication between the computer devices is centered only on an individual's workspace. PAN offers a network range of 1 to 100 meters from person to device providing communication.

  18. Computer networks (article)

    Computer networks. The Internet is the world's largest computer network. Let's break that down: A computer network is any group of interconnected computing devices capable of sending or receiving data. A computing device isn't just a computer—it's any device that can run a program, such as a tablet, phone, or smart sensor.

  19. Introduction To Computer Networking

    Introduction To Computer Networking. A computer network is a set of computers connected together for the purpose of sharing resources. The most common resource shared today is connection to the Internet. Other shared resources can include a printer or a file server.

  20. An Introduction to Computer Networks

    An Introduction to Computer Networksis a free and open general-purpose computer-networking textbook, complete with diagrams and exercises.It covers the LAN, internetworking and transport layers, focusing primarily on TCP/IP. Particular attention is paid to congestion; other special topics include queuing, real-time traffic, network management, security and the ns simulator.

  21. Basics of Computer Networking

    Introduction : A Metropolitan Area Network (MAN) is a type of computer network that spans over a metropolitan area, typically a city. It provides high-speed data communication services such as video, audio, and data transfer between multiple LANs (Local Area Networks) and WANs (Wide Area Networks). The main purpose of a MAN is to connect different

  22. What Is Networking?

    A computer network comprises two or more computers that are connected—either by cables (wired) or wifi (wireless)—with the purpose of transmitting, exchanging, or sharing data and resources. You build a computer network by using hardware (for example, routers, switches, access points, and cables) and software (for example, operating systems ...

  23. (PPT) INTRODUCTION TO COMPUTER NETWORKS

    The computer network enables to analyze, organize and disseminate the information that is essential to profitability. This paper provides information about different types of network. In this review paper we are presenting the basic concepts of network, network architecture and network type's i.e. LAN, MAN and WAN with its advantages and ...

  24. Computer Networks

    A computer network allows devices to exchange data via physical connections like cables or wirelessly. The document defines different types of networks based on size and coverage area: personal area networks covering 10 meters; local area networks connecting devices within an office or home; metropolitan area networks spanning a city; and wide area networks covering large geographic areas like ...

  25. Computer Network Powerpoint Templates and Google Slides Themes

    These computer network themed PowerPoint templates can enhance your presentations by providing a visually appealing and cohesive design that aligns with the topic. The modern and professional look of these templates will captivate your audience and help you effectively convey your message about computer networks.

  26. Basics of computer networks

    Network criteria. Types of Network. LAN, MAN, WAN, Workstation, Workgroup, Domain. Read more. Engineering. 1 of 29. Download now. Basics of computer networks - Download as a PDF or view online for free.