SlideShare une entreprise Scribd logo
1  sur  25
Business Network and
Telecommunication
Chapter # 5
Abdul Rashed Barakzai
Networking
Grouping of two or more computer or devices for the purpose of Data and
resource sharing.
Or
Networking is connecting of two or more computers for the purpose of
sharing or exchanging information or data is called Network.
Primary
Purpose of
Networking
 File sharing
 Printer and other device sharing
 Enabling Administration and Security
 Exchanging Information or Data
 Sending or Receiving Data or Information
 Etc
Element of
Network
 Computer ( Server and Client)
 Operating System or Windows
 Network Hardware
 Network Software
 Protocols
 Cables
 Switch
 Modem or Router
 Etc
Network
Challenges
 Availability
 Reliability
 Serviceability
 Performance
 Security
 Sustainability
 Compatibility
 Quality of Service (QoS)
Network
Classification
 LAN ( Local Area Network)
 WAN ( Wide Area Network)
LAN
(Local Area
Network)
A local area network is a computer network that interconnects computers
within a limited area such as a residence, school, laboratory, university
campus or office building.
LAN are characterized by the Following:
 They transfer data at high speeds
 They exist in a limited geographical area
 Their technology is generally less expensive
WAN
(Wide Area
Network)
A wide area network is a network that extends over a large geographic area
for the primary purpose of computer networking. Wide area networks are
often established with leased telecommunication circuits..
WAN are characterized by the Following:
 Unlimited geographical area
 Most error come out
 They are interconnected with multiple LANs
 Their technology is generally expensive
Peer to Peer
Network
 Peer to peer network is a group of user or PCs that basically operated as
equal. Each PC is called a peer.
 The Peers share resources such as file and printers but not specialized server .
 Each peer is responsible for its own security
Intranet
An intranet is a computer network for sharing information, collaboration
tools, operational systems, and other computing services within an
organization, usually to the exclusion of access by outsiders.
Extranet
Extranet is an external-facing website containing information that is typically only
accessible on an organization's intranet (or internal network). Access to
an extranet is controlled and limited only to authorized users such as partners,
vendors, suppliers, or customers
Extra net is a network link that use internet technologies to interconnect the intranet
of a business with intranets of its customers, suppliers or other business partners.
Internet
Detail will be added
Classification
by network
Architecture
1. Client or Server network
2. Peer to Peer network
Client or
Server bas
network
A server base network is consists of a group of user or Pcs ( Called clients) that
request and receive network serves from specialized computer called server.
 Server are generally high performance system
 Optimized to provide network services to other computers
 Common server types are: Mail server, Printer server, File server and Etc.
Peer to Peer
 Peer to peer network is a group of user oriented computers that basically
operate as equals. Each Pc is called per. The peers share resources, such as file,
printer and Etc, but no specialized servers exist.
 Each peer is responsible for its own security and each peer is booth client and
server.
 Small network usually under 10 machines may work well in this configuration
Network
Topologies
Network topology is the arrangement of the elements of a communication
network. Network topology can be used to define or describe the
arrangement of various types of telecommunication networks, including
command and control radio networks, industrial field busses and computer
networks.
Simply we can say Topologies is the physical layout of a network. There
are main three types of Topologies.
 Bus Topologies
 Ring Topologies
 Star Topologies
Bus Topologies
A bus topology is a topology for a Local Area Network (LAN) in which all
the nodes are connected to a single cable. The cable to which the nodes
connect is called a "backbone". If the backbone is broken, the entire
segment fails. Bus topologies are relatively easy to install and don't require
much cabling compared to the alternatives.
Ring
Topologies
 A ring topology is a topology for a Local Area Network (LAN) in which every
device has exactly two neighbors for communication purposes.
 Typically, all messages travel through a ring in the same direction. A failure in
any cable or device breaks the loop and will take down the entire segment.
Another disadvantage of the ring is that if any device is added to or removed
from the ring, the ring is broken and the segment fails.
 In wide area networks (WAN) and metropolitan area networks (MAN), a ring
topology is used to as the topology for the backbone (sometimes called a city
ring) to connect the customers. In that case the ring is used in both directions to
have two distinctive paths to the public switch.
Star Topologies
A star topology is a topology for a Local Area Network (LAN) in which all nodes are
individually connected to a central connection point, like a hub or a switch. A star
takes more cable than e.g. a bus, but the benefit is that if a cable fails, only one node
will be brought down.
All traffic emanates from the hub of the star. The central site is in control of all the
nodes attached to it. The central hub is usually a fast, self contained computer and is
responsible for routing all traffic to other nodes. The main advantages of a star
network is that one malfunctioning node does not affect the rest of the network.
However this type of network can be prone to bottleneck and failure problems at the
central site.
A star network is often combined with a bus topology. The central hub is then
connected to the backbone of the bus. This combination is called a tree
Bandwidth
Bandwidth is measured as the amount of data that can be transferred from one point
to another within a network in a specific amount of time. ... The
term bandwidth refers to the transmission capacity of a connection and is an
important factor when determining the quality and speed of a network or
the internet connection.
Classification of Bandwidth:
 Downstream Bandwidth ( Download)
 Upstream bandwidth ( Upload)
Measurement of Bandwidth:
 Kbps
 Mbps
 Gbps
Network
Media
Twisted Pair: Use for Telephone
Coaxial Cable: Use for TV cables
Fiber Optic Cable: Thin strands of glass that use light to transmit signals
Network
Protocol
Network protocols are a set of rules, conventions, and data structures that dictate how
devices exchange data across networks. In other words, network protocols can be
equated to languages that two devices must understand for seamless communication
of information, regardless of their infrastructure and design disparities
Network
Protocol
 Transmission Control Protocol (TCP)
 Internet Protocol (IP)
 User Datagram Protocol (UDP)
 Post office Protocol (POP)
 Simple mail transport Protocol (SMTP)
 File Transfer Protocol (FTP)
 Hyper Text Transfer Protocol (HTTP)
 Hyper Text Transfer Protocol Secure (HTTPS)
 Telnet
 Gopher
Business Network and Telecommunication, LAN vs WAN

Contenu connexe

Similaire à Business Network and Telecommunication, LAN vs WAN

Fundamentals of Computer Networking - Shift Education of Technology
Fundamentals of Computer Networking - Shift Education of TechnologyFundamentals of Computer Networking - Shift Education of Technology
Fundamentals of Computer Networking - Shift Education of TechnologyRaphaff
 
Introduction to-computer-networking
Introduction to-computer-networkingIntroduction to-computer-networking
Introduction to-computer-networkingArdit Meti
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingAnuja Lad
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingKhan Rahimeen
 
Computer Network ssss ppt.pptx
Computer Network ssss ppt.pptxComputer Network ssss ppt.pptx
Computer Network ssss ppt.pptxRamNivas42
 
LAN (Local Area Network)
LAN (Local Area Network)LAN (Local Area Network)
LAN (Local Area Network)Ridwanul Hoque
 
7312334 chapter-7 a-networking-basics
7312334 chapter-7 a-networking-basics7312334 chapter-7 a-networking-basics
7312334 chapter-7 a-networking-basicsfasywan
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And TelecommunicationsUMaine
 
basiccomponentsofacomputernetwork-210820131631.pptx
basiccomponentsofacomputernetwork-210820131631.pptxbasiccomponentsofacomputernetwork-210820131631.pptx
basiccomponentsofacomputernetwork-210820131631.pptx14941
 
454548 634160871407732500
454548 634160871407732500454548 634160871407732500
454548 634160871407732500prabh_in
 
Terminologies used with networking
Terminologies used with networkingTerminologies used with networking
Terminologies used with networkingchamwama
 
Networking presentation
Networking presentationNetworking presentation
Networking presentationGajan Hai
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingRozitarmizi Mohammad
 
1 introduction-to-computer-networking slide
1 introduction-to-computer-networking slide1 introduction-to-computer-networking slide
1 introduction-to-computer-networking slidenextgencyber cafe
 
introduction-to-computer-networking
introduction-to-computer-networkingintroduction-to-computer-networking
introduction-to-computer-networkingSithu PM
 

Similaire à Business Network and Telecommunication, LAN vs WAN (20)

NETWORKING
NETWORKINGNETWORKING
NETWORKING
 
Fundamentals of Computer Networking - Shift Education of Technology
Fundamentals of Computer Networking - Shift Education of TechnologyFundamentals of Computer Networking - Shift Education of Technology
Fundamentals of Computer Networking - Shift Education of Technology
 
Introduction to-computer-networking
Introduction to-computer-networkingIntroduction to-computer-networking
Introduction to-computer-networking
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Rkp internet part i
Rkp internet part iRkp internet part i
Rkp internet part i
 
Computer Network ssss ppt.pptx
Computer Network ssss ppt.pptxComputer Network ssss ppt.pptx
Computer Network ssss ppt.pptx
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
LAN (Local Area Network)
LAN (Local Area Network)LAN (Local Area Network)
LAN (Local Area Network)
 
7312334 chapter-7 a-networking-basics
7312334 chapter-7 a-networking-basics7312334 chapter-7 a-networking-basics
7312334 chapter-7 a-networking-basics
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
 
basiccomponentsofacomputernetwork-210820131631.pptx
basiccomponentsofacomputernetwork-210820131631.pptxbasiccomponentsofacomputernetwork-210820131631.pptx
basiccomponentsofacomputernetwork-210820131631.pptx
 
Networking(CPM & PERT)
Networking(CPM & PERT)Networking(CPM & PERT)
Networking(CPM & PERT)
 
454548 634160871407732500
454548 634160871407732500454548 634160871407732500
454548 634160871407732500
 
Terminologies used with networking
Terminologies used with networkingTerminologies used with networking
Terminologies used with networking
 
Networking presentation
Networking presentationNetworking presentation
Networking presentation
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
1 introduction-to-computer-networking slide
1 introduction-to-computer-networking slide1 introduction-to-computer-networking slide
1 introduction-to-computer-networking slide
 
introduction-to-computer-networking
introduction-to-computer-networkingintroduction-to-computer-networking
introduction-to-computer-networking
 

Plus de Rashed Barakzai

Plant Location and Layout: This presentation include information about select...
Plant Location and Layout: This presentation include information about select...Plant Location and Layout: This presentation include information about select...
Plant Location and Layout: This presentation include information about select...Rashed Barakzai
 
Leadership definition and Leader vs Boss
Leadership definition and Leader vs BossLeadership definition and Leader vs Boss
Leadership definition and Leader vs BossRashed Barakzai
 
Executive Information System in Management Information System
Executive Information System in Management Information SystemExecutive Information System in Management Information System
Executive Information System in Management Information SystemRashed Barakzai
 
E-Business and E- Business Type and Transaction Process System
E-Business and E- Business Type and Transaction Process SystemE-Business and E- Business Type and Transaction Process System
E-Business and E- Business Type and Transaction Process SystemRashed Barakzai
 
Database Management and it is definition
Database Management and it is definitionDatabase Management and it is definition
Database Management and it is definitionRashed Barakzai
 
Management and Decision making and Types of Decisions
Management and Decision making and Types of DecisionsManagement and Decision making and Types of Decisions
Management and Decision making and Types of DecisionsRashed Barakzai
 
System Model in Management Information System
System Model in Management Information SystemSystem Model in Management Information System
System Model in Management Information SystemRashed Barakzai
 
Introduction to Management Information System
Introduction to Management Information SystemIntroduction to Management Information System
Introduction to Management Information SystemRashed Barakzai
 
Recruitment and Selection
Recruitment and SelectionRecruitment and Selection
Recruitment and SelectionRashed Barakzai
 
The cultural context of IHRM
The cultural context of IHRMThe cultural context of IHRM
The cultural context of IHRMRashed Barakzai
 
International Human Resource Management
International Human Resource ManagementInternational Human Resource Management
International Human Resource ManagementRashed Barakzai
 
Management & Decision Making
Management & Decision MakingManagement & Decision Making
Management & Decision MakingRashed Barakzai
 
Product and Operation Management
Product and Operation ManagementProduct and Operation Management
Product and Operation ManagementRashed Barakzai
 
Team building (staff and partnership)
Team building (staff and partnership)Team building (staff and partnership)
Team building (staff and partnership)Rashed Barakzai
 
Smart Maktab Business Plan
Smart Maktab Business PlanSmart Maktab Business Plan
Smart Maktab Business PlanRashed Barakzai
 

Plus de Rashed Barakzai (20)

Plant Location and Layout: This presentation include information about select...
Plant Location and Layout: This presentation include information about select...Plant Location and Layout: This presentation include information about select...
Plant Location and Layout: This presentation include information about select...
 
Leadership definition and Leader vs Boss
Leadership definition and Leader vs BossLeadership definition and Leader vs Boss
Leadership definition and Leader vs Boss
 
Executive Information System in Management Information System
Executive Information System in Management Information SystemExecutive Information System in Management Information System
Executive Information System in Management Information System
 
E-Business and E- Business Type and Transaction Process System
E-Business and E- Business Type and Transaction Process SystemE-Business and E- Business Type and Transaction Process System
E-Business and E- Business Type and Transaction Process System
 
Database Management and it is definition
Database Management and it is definitionDatabase Management and it is definition
Database Management and it is definition
 
Management and Decision making and Types of Decisions
Management and Decision making and Types of DecisionsManagement and Decision making and Types of Decisions
Management and Decision making and Types of Decisions
 
System Model in Management Information System
System Model in Management Information SystemSystem Model in Management Information System
System Model in Management Information System
 
Introduction to Management Information System
Introduction to Management Information SystemIntroduction to Management Information System
Introduction to Management Information System
 
Recruitment and Selection
Recruitment and SelectionRecruitment and Selection
Recruitment and Selection
 
The cultural context of IHRM
The cultural context of IHRMThe cultural context of IHRM
The cultural context of IHRM
 
International Human Resource Management
International Human Resource ManagementInternational Human Resource Management
International Human Resource Management
 
Management & Decision Making
Management & Decision MakingManagement & Decision Making
Management & Decision Making
 
Project management
Project managementProject management
Project management
 
Product and Operation Management
Product and Operation ManagementProduct and Operation Management
Product and Operation Management
 
Growth final
Growth finalGrowth final
Growth final
 
Team building (staff and partnership)
Team building (staff and partnership)Team building (staff and partnership)
Team building (staff and partnership)
 
Business management
Business managementBusiness management
Business management
 
Smart Maktab Business Plan
Smart Maktab Business PlanSmart Maktab Business Plan
Smart Maktab Business Plan
 
Proposal writing
Proposal writingProposal writing
Proposal writing
 
7 Cs of Communication
7 Cs of Communication7 Cs of Communication
7 Cs of Communication
 

Dernier

How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxMasterG
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfOverkill Security
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...SOFTTECHHUB
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Paige Cruz
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 

Dernier (20)

How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 

Business Network and Telecommunication, LAN vs WAN

  • 2. Networking Grouping of two or more computer or devices for the purpose of Data and resource sharing. Or Networking is connecting of two or more computers for the purpose of sharing or exchanging information or data is called Network.
  • 3. Primary Purpose of Networking  File sharing  Printer and other device sharing  Enabling Administration and Security  Exchanging Information or Data  Sending or Receiving Data or Information  Etc
  • 4. Element of Network  Computer ( Server and Client)  Operating System or Windows  Network Hardware  Network Software  Protocols  Cables  Switch  Modem or Router  Etc
  • 5. Network Challenges  Availability  Reliability  Serviceability  Performance  Security  Sustainability  Compatibility  Quality of Service (QoS)
  • 6. Network Classification  LAN ( Local Area Network)  WAN ( Wide Area Network)
  • 7. LAN (Local Area Network) A local area network is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building. LAN are characterized by the Following:  They transfer data at high speeds  They exist in a limited geographical area  Their technology is generally less expensive
  • 8. WAN (Wide Area Network) A wide area network is a network that extends over a large geographic area for the primary purpose of computer networking. Wide area networks are often established with leased telecommunication circuits.. WAN are characterized by the Following:  Unlimited geographical area  Most error come out  They are interconnected with multiple LANs  Their technology is generally expensive
  • 9. Peer to Peer Network  Peer to peer network is a group of user or PCs that basically operated as equal. Each PC is called a peer.  The Peers share resources such as file and printers but not specialized server .  Each peer is responsible for its own security
  • 10. Intranet An intranet is a computer network for sharing information, collaboration tools, operational systems, and other computing services within an organization, usually to the exclusion of access by outsiders.
  • 11. Extranet Extranet is an external-facing website containing information that is typically only accessible on an organization's intranet (or internal network). Access to an extranet is controlled and limited only to authorized users such as partners, vendors, suppliers, or customers Extra net is a network link that use internet technologies to interconnect the intranet of a business with intranets of its customers, suppliers or other business partners.
  • 13. Classification by network Architecture 1. Client or Server network 2. Peer to Peer network
  • 14. Client or Server bas network A server base network is consists of a group of user or Pcs ( Called clients) that request and receive network serves from specialized computer called server.  Server are generally high performance system  Optimized to provide network services to other computers  Common server types are: Mail server, Printer server, File server and Etc.
  • 15. Peer to Peer  Peer to peer network is a group of user oriented computers that basically operate as equals. Each Pc is called per. The peers share resources, such as file, printer and Etc, but no specialized servers exist.  Each peer is responsible for its own security and each peer is booth client and server.  Small network usually under 10 machines may work well in this configuration
  • 16. Network Topologies Network topology is the arrangement of the elements of a communication network. Network topology can be used to define or describe the arrangement of various types of telecommunication networks, including command and control radio networks, industrial field busses and computer networks. Simply we can say Topologies is the physical layout of a network. There are main three types of Topologies.  Bus Topologies  Ring Topologies  Star Topologies
  • 17. Bus Topologies A bus topology is a topology for a Local Area Network (LAN) in which all the nodes are connected to a single cable. The cable to which the nodes connect is called a "backbone". If the backbone is broken, the entire segment fails. Bus topologies are relatively easy to install and don't require much cabling compared to the alternatives.
  • 18. Ring Topologies  A ring topology is a topology for a Local Area Network (LAN) in which every device has exactly two neighbors for communication purposes.  Typically, all messages travel through a ring in the same direction. A failure in any cable or device breaks the loop and will take down the entire segment. Another disadvantage of the ring is that if any device is added to or removed from the ring, the ring is broken and the segment fails.  In wide area networks (WAN) and metropolitan area networks (MAN), a ring topology is used to as the topology for the backbone (sometimes called a city ring) to connect the customers. In that case the ring is used in both directions to have two distinctive paths to the public switch.
  • 19. Star Topologies A star topology is a topology for a Local Area Network (LAN) in which all nodes are individually connected to a central connection point, like a hub or a switch. A star takes more cable than e.g. a bus, but the benefit is that if a cable fails, only one node will be brought down. All traffic emanates from the hub of the star. The central site is in control of all the nodes attached to it. The central hub is usually a fast, self contained computer and is responsible for routing all traffic to other nodes. The main advantages of a star network is that one malfunctioning node does not affect the rest of the network. However this type of network can be prone to bottleneck and failure problems at the central site. A star network is often combined with a bus topology. The central hub is then connected to the backbone of the bus. This combination is called a tree
  • 20.
  • 21. Bandwidth Bandwidth is measured as the amount of data that can be transferred from one point to another within a network in a specific amount of time. ... The term bandwidth refers to the transmission capacity of a connection and is an important factor when determining the quality and speed of a network or the internet connection. Classification of Bandwidth:  Downstream Bandwidth ( Download)  Upstream bandwidth ( Upload) Measurement of Bandwidth:  Kbps  Mbps  Gbps
  • 22. Network Media Twisted Pair: Use for Telephone Coaxial Cable: Use for TV cables Fiber Optic Cable: Thin strands of glass that use light to transmit signals
  • 23. Network Protocol Network protocols are a set of rules, conventions, and data structures that dictate how devices exchange data across networks. In other words, network protocols can be equated to languages that two devices must understand for seamless communication of information, regardless of their infrastructure and design disparities
  • 24. Network Protocol  Transmission Control Protocol (TCP)  Internet Protocol (IP)  User Datagram Protocol (UDP)  Post office Protocol (POP)  Simple mail transport Protocol (SMTP)  File Transfer Protocol (FTP)  Hyper Text Transfer Protocol (HTTP)  Hyper Text Transfer Protocol Secure (HTTPS)  Telnet  Gopher

Notes de l'éditeur

  1. Shahre now Kartee Karte 4 kargha
  2. Internet. Intranet. Extranet
  3. www.google