0% found this document useful (0 votes)
4 views

Network Types

Uploaded by

indiansrv69
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

Network Types

Uploaded by

indiansrv69
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 9

Network Types

Computer networks are essential for modern businesses and organizations.


They allow for the sharing of information, resources, and communication.
There are different types of networks, each with its own purpose and
characteristics.

by india server
Internet
An intranet is a private computer network that uses the internet protocol to securely share any part of information of
an organization. It is a closed network that is only accessible to authorized users within the organization. Intranets are
commonly used for internal communication, collaboration, and information sharing.

Secure
Intranets are designed to be secure, with access restricted to authorized users. This helps to protect sensitive
information from unauthorized access.

Efficient
Intranets can improve efficiency by providing a central location for information and resources. This can reduce
the need for paper-based communication and streamline workflows.

Collaborative
Intranets can facilitate collaboration by providing tools for sharing documents, calendars, and other information.
This can help teams to work together more effectively.
Extranet
An extranet is a computer network that allows controlled access from outside for specific business or educational purposes. It is a type
of network that extends the intranet of an organization to external users, such as suppliers, customers, or partners.

Controlled Access Business Collaboration Educational Purposes

Extranets provide controlled access to Extranets facilitate business Extranets can be used for educational
external users, allowing them to access collaboration by providing a platform purposes, allowing students, teachers,
specific information and resources for communication, information and administrators to access online
while protecting sensitive data. sharing, and workflow management resources, collaborate on projects, and
between organizations and their communicate with each other.
partners.
Network Operating System
A network operating system (NOS) is a set of computer programs that manages the resources on a network. It
provides the infrastructure for communication and data sharing between devices on the network.

1 Resource Management
NOS manages network resources such as printers, servers, and storage devices, ensuring efficient allocation
and access.

2 Security
NOS provides security features to protect the network from unauthorized access, data breaches, and other
threats.

3 Communication
NOS facilitates communication between devices on the network, enabling users to share files, send messages,
and collaborate on projects.

4 Network Monitoring
NOS monitors network performance, identifies issues, and provides tools for troubleshooting and
maintenance.
Novell Network
Novell NetWare is a network operating system developed by Novell. It was one of the first popular NOS solutions and was widely used in
the 1990s and early 2000s. NetWare is known for its file and print services, directory services, and security features.

File and Print Services Directory Services Security Features


NetWare provides centralized file and NetWare includes a directory service NetWare offers security features such
print services, allowing users to access called NDS (Novell Directory as user authentication, access control,
shared resources from anywhere on the Services) that manages user accounts, and data encryption to protect network
network. groups, and other network objects. resources.
Microsoft Windows NT
Microsoft Windows NT is a family of operating systems developed by Microsoft. It was released in 1993 and has
evolved over the years, with versions such as Windows 2000, Windows XP, and Windows Server 2003. Windows NT
is known for its stability, security, and compatibility with a wide range of hardware and software.

Version Release Date Key Features

Windows NT 3.1 July 27, 1993 First version of Windows NT,


introduced a new kernel and
security features.

Windows NT 3.5 September 21, 1994 Improved performance, added


support for new hardware and
software.

Windows NT 3.51 May 30, 1995 Bug fixes and stability


improvements.

Windows NT 4.0 July 24, 1996 Introduced Active Directory,


improved networking
capabilities, and enhanced
security.
Linux - Unix
Linux is a Unix-like operating system that is known for its open-source nature, flexibility, and stability. It is widely used in servers,
embedded systems, and personal computers. Unix is a family of operating systems that are known for their multi-user, multitasking
capabilities and portability.

Server Operating Desktop Operating Mobile Operating Cloud Computing


System System System
Linux and Unix are widely
Linux and Unix are popular Linux distributions such as Android, a mobile operating used in cloud computing
choices for server operating Ubuntu, Fedora, and Debian system based on Linux, is the environments, providing the
systems, providing reliable are popular desktop operating most popular mobile foundation for cloud
and secure platforms for systems, offering a user- operating system in the world, platforms and services.
hosting websites, friendly interface and a wide powering billions of
applications, and databases. range of applications. smartphones and tablets.
Network Security
Network security is crucial for protecting sensitive information and resources from unauthorized access, data breaches, and other threats. It
involves implementing measures to prevent, detect, and respond to security incidents.

Firewall 1
A firewall is a security system that acts as a barrier
between a network and the outside world, blocking
unauthorized access and malicious traffic. 2 Antivirus Software
Antivirus software protects against malware, such as
viruses, worms, and Trojans, by detecting and
removing them from devices and networks.
Intrusion Detection System (IDS) 3
An IDS monitors network traffic for suspicious
activity and alerts administrators to potential security
threats. Virtual Private Network (VPN)
4
A VPN encrypts internet traffic and routes it through a
secure tunnel, protecting data from eavesdropping and
Data Encryption 5 interception.
Data encryption converts data into an unreadable
format, making it inaccessible to unauthorized users.
Network Management
Network management involves monitoring, configuring, and troubleshooting network devices and services to ensure optimal performance
and security. It includes tasks such as network monitoring, performance analysis, and security management.

Network Monitoring Network Configuration Network Troubleshooting


Network monitoring tools provide real- Network configuration tools allow Network troubleshooting tools help to
time insights into network performance, administrators to configure network diagnose and resolve network issues, such
identifying issues and bottlenecks. devices, services, and security settings. as connectivity problems and performance
degradation.

You might also like