SlideShare a Scribd company logo
Computer Network is a
network in which multiple
computers are connected
to
other to share
information and
resources.
In today’s era , people in one
part of the world can
communicate with those in
the other corner of the world. All this is possible because of the
technological advancements in communication systems.
 Easy data sharing
Easy access to data
Cost effectiveness
Fault tolerance
Quality of service
Security
No need to keep hard
copies of documents
A router is a communication device
that is used to connect two logically
and physically different networks.
Router uses the IP address.
Network Interface Unit (NIC or NIU) is
a device that allows communication
of computer system over the
network.
Hub is a hardware device that connects
multiple computers or other networks
or other network devices together.
Switches are small hubs that
send data directly to the
destination rather than every
part within network. A switch
is smarter device than hub.
A repeater is a device that
boosts the signal being
transmitted on the network.
The full form of MODEM is
Modulator Demodulator. It is a
hardware device that allows a
computer to send and receive
information over telephone lines.
Communication channel is a medium through which data is
transmitted from one location to another.
Wired or guided media
Wireless or unguided media
It covers a small physical area
like a home, office or small
group of buildings, such as a
school or airport.
MAN consists of a computer network
across an entire city, college campus
or small region. A MAN is larger than
a LAN.
WAN is a computer network that
covers a large geographic area. The
Internet is the best example of a
WAN.
PAN is a computer network
organized by an individual
person within a single
building. PAN are used for
communication among
various devices, such as
telephones, personal digital
assistants, fax machines and
printers that are located
close to a single user.
Network security is ensured in
many ways. Two of the most
common ways are as follows:
Each authorized user is given
a unique username and password
for accessing the network.
Different users are given
different types of access rights,
such as read only access, read-
write access, and no access.

More Related Content

PDF
Lesson 1 introduction
PPT
Computer Networking_XII_CS_CBSE_OFKVS.ppt
PDF
Computer network theory
DOCX
Computer networking project
PDF
Computer network
PPTX
Communication
PPTX
Networks (unit 4)
PPTX
Computer networking
Lesson 1 introduction
Computer Networking_XII_CS_CBSE_OFKVS.ppt
Computer network theory
Computer networking project
Computer network
Communication
Networks (unit 4)
Computer networking

Similar to Presentation7.pptx (20)

PDF
network.pdf
PPTX
8 Networking for ICT.pptx
PPTX
Networking
PPTX
NETWORKING CONCEPTS of class 8 KIPS.pptx
PDF
Computer Network Second Edition
PPTX
ComputerNEtWorksComplete.pptxComputerNEtWorksComplete.pptx
DOC
Computer Networking
DOCX
Computer network note
PDF
Assignment1
PDF
Computer networks
PPTX
Networking Concepts
PPTX
TELECOMMUNICATION AND NETWORK topologies
PPTX
Computer network
PPTX
S5 MCE. UNIT 3 COMPUTER SCIENCE.pptx
PDF
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
PPTX
Bab3-computer network
PDF
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
PPT
cloud presentation asdfsd sdfsdafsdfsdsdf .ppt
PDF
1 computer networks basic
network.pdf
8 Networking for ICT.pptx
Networking
NETWORKING CONCEPTS of class 8 KIPS.pptx
Computer Network Second Edition
ComputerNEtWorksComplete.pptxComputerNEtWorksComplete.pptx
Computer Networking
Computer network note
Assignment1
Computer networks
Networking Concepts
TELECOMMUNICATION AND NETWORK topologies
Computer network
S5 MCE. UNIT 3 COMPUTER SCIENCE.pptx
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
Bab3-computer network
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
cloud presentation asdfsd sdfsdafsdfsdsdf .ppt
1 computer networks basic
Ad

Recently uploaded (20)

PPTX
t_and_OpenAI_Combined_two_pressentations
PPT
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
PDF
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
PDF
Understand the Gitlab_presentation_task.pdf
DOC
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
PPT
12 Things That Make People Trust a Website Instantly
PDF
Slides PDF: The World Game (s) Eco Economic Epochs.pdf
PPTX
Database Information System - Management Information System
PDF
Exploring VPS Hosting Trends for SMBs in 2025
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PPTX
newyork.pptxirantrafgshenepalchinachinane
PDF
Alethe Consulting Corporate Profile and Solution Aproach
PPTX
Internet Safety for Seniors presentation
PDF
simpleintnettestmetiaerl for the simple testint
PPTX
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
PPTX
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
PPTX
APNIC Report, presented at APAN 60 by Thy Boskovic
PDF
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
PDF
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
PPTX
Reading as a good Form of Recreation
t_and_OpenAI_Combined_two_pressentations
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
Understand the Gitlab_presentation_task.pdf
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
12 Things That Make People Trust a Website Instantly
Slides PDF: The World Game (s) Eco Economic Epochs.pdf
Database Information System - Management Information System
Exploring VPS Hosting Trends for SMBs in 2025
Power Point - Lesson 3_2.pptx grad school presentation
newyork.pptxirantrafgshenepalchinachinane
Alethe Consulting Corporate Profile and Solution Aproach
Internet Safety for Seniors presentation
simpleintnettestmetiaerl for the simple testint
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
APNIC Report, presented at APAN 60 by Thy Boskovic
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
Reading as a good Form of Recreation
Ad

Presentation7.pptx

  • 1. Computer Network is a network in which multiple computers are connected to other to share information and resources. In today’s era , people in one part of the world can communicate with those in the other corner of the world. All this is possible because of the technological advancements in communication systems.
  • 2.  Easy data sharing Easy access to data Cost effectiveness Fault tolerance Quality of service Security No need to keep hard copies of documents
  • 3. A router is a communication device that is used to connect two logically and physically different networks. Router uses the IP address. Network Interface Unit (NIC or NIU) is a device that allows communication of computer system over the network. Hub is a hardware device that connects multiple computers or other networks or other network devices together.
  • 4. Switches are small hubs that send data directly to the destination rather than every part within network. A switch is smarter device than hub. A repeater is a device that boosts the signal being transmitted on the network. The full form of MODEM is Modulator Demodulator. It is a hardware device that allows a computer to send and receive information over telephone lines.
  • 5. Communication channel is a medium through which data is transmitted from one location to another. Wired or guided media Wireless or unguided media
  • 6. It covers a small physical area like a home, office or small group of buildings, such as a school or airport.
  • 7. MAN consists of a computer network across an entire city, college campus or small region. A MAN is larger than a LAN. WAN is a computer network that covers a large geographic area. The Internet is the best example of a WAN.
  • 8. PAN is a computer network organized by an individual person within a single building. PAN are used for communication among various devices, such as telephones, personal digital assistants, fax machines and printers that are located close to a single user.
  • 9. Network security is ensured in many ways. Two of the most common ways are as follows: Each authorized user is given a unique username and password for accessing the network. Different users are given different types of access rights, such as read only access, read- write access, and no access.