Networks
Networks
Networks
Computer Network:
Introduction to Networks
Components of Network
Classification/ Types of networks
Network Topologies
Advantages & Disadvantages
Computer Networks
Computer network
connects two or
more autonomous
computers.
The computers can
be geographically
located anywhere.
Use of Networks
Resource Sharing
Hardware (computing resources, disks, printers)
Software (application software)
Information Sharing
Easy accessibility from anywhere (files, databases)
Search Capability (WWW)
Communication
Email
Message broadcast
Remote computing
Distributed processing (GRID Computing)
Applications
E-mail
Searchable Data
(Web Sites)
E-Commerce
News Groups
Internet Telephony
(VoIP)
Video Conferencing
Chat Groups
Instant Messengers
Internet Radio
Management
Resource Sharing
Electronic Mail
Flexible Access
Workgroup Computing
(Simultaneous)
Disadvantages
Server Faults
Network Faults
Hackers
Centralized decision
Degradation in performance
Network Management can be difficult
Security issues
Types of Networks
Based on Topology
Star Topology
Bus Topology
Ring Topology
Mesh Topology
Combination Topology
Based on Architecture
Client-Server
Peer-to-Peer
Based on Size
LAN
WAN
MAN
PAN
Intranet and Extranet
VPNs
Network Topology
Defines the way in
which computers,
printers, and other
devices are
connected.
Describes the layout
of the wire and
devices as well as
the paths used by
data transmissions.
Bus Topology
Commonly referred
Ring Topology
A frame travels around the
Mesh Topology
The mesh topology
Client-Server
Concept of Websites
Peer-to-Peer
There in no central Server
All Nodes are connected to every other
Network Components
Networking Media
Networking Devices
Nodes/ Connecting Devices (Computers,
Networking Media
Networking media
can be defined
simply as the means
by which signals
(data) are sent from
one computer to
another (either by
cable or wireless
means).
Networking Devices
Modem
Hub
Switches
Routers
Gateway
Bridges
Repeaters
arrangement, network
services are located in a
dedicated computer whose
only function is to respond
to the requests of clients.
The server contains the file,
Security Issues
Malicious Program:
Virus
Worms
Trojan Horse
Denial-of-Service
Phishing: Getting sensitive information by
masquerading
Spoofing: Masquerades as others
Defamation
Stalking
E-mail Bombing
Data Diddling
Salami Attack
Logic Bombs
Others: Intellectual Property Crime, Forgery