SlideShare ist ein Scribd-Unternehmen logo
1 von 5
COMPUTER
OF
PROJECT

Submitted to

Submitted By
Name : Prabhasis singh
Class :
VII green
Roll no :
-13

Computer Network
The computers are connected in a
network to exchange information and
data. The computers connected in a
network can also use resources of other
computers.

NETWORK HARDWARE
Network
hardware
is
the
individual components of a network
system that are responsible for
transmitting data and facilitating the
operations of a computer network.
Although a network contains many
hardware components, there are several
basic categories that make up the complete
operations of a network system.

Network topology
Bus Topology: A bus topology is a type of network setup where each
computer and network device is connected to a single cable or backbone.
Below, is a visual example of a simple computer setup on a network using
the bus topology.

Star topology: Each of the devices and computers on a network
connect to a central hub. A major disadvantage of this network topology is
that if the central hub fails, all computers connected to that hub would be
disconnected. Below is a visual example of a simple computer setup on a
network using the star topology.

Ring Topology: Alternatively referred to as a ring network, the ring
topology is a computer network configuration where each network computer
and device are connected to each other forming a large circle (or similar
shape). Each packet is sent around the ring until it reaches its final
destination. Today, the ring topology is seldom used. Below is a visual
example of a simple computer setup on a network using a ring topology.

LAN –Local Area Network
WAN-Wide Area Network
MAN- Metropolitan Area Network
CAN-Campus area Network, Controller Area Network,or Some times
Cluster area Network
PAN- Personal Area Network
LAN: A local area network (LAN) consists of two or more computers
connected together in a building or home using software and hardware. This
is contrasted to a wide area network (WAN) such as the Internet, which
covers a large geographic area. In a LAN, there is a main computer or server,
and remote computers called clients.

WAN: Wide Area Network, WAN is a collection of computers and
network resources connected via a network over a geographic area. WideArea Networks are commonly connected either through theInternet or special
arrangements made with phone companies or other service providers. A
WAN is different from a MAN because of the distance between each of the
networks. In a WAN, one network may be anywhere from several hundred
miles away, to across the globe in a different country

MAN:, A metropolitan area network (MAN) is a network that
interconnects users with computer resources in a geographic area or region
larger than that covered by even a large local area network (LAN) but
smaller than the area covered by a wide area network (WAN)
CAN:A Controller Area Network (CAN) refers to a network of
independent controllers. It is a serial
communications protocol that efficiently supports distributed real-time
control with a very high level of
security. The CAN bus standard was developed by Bosch and Intel a

PAN: What is PAN & how do I get a PAN at the General Chit Chat within
the Traderji.com - Discussion forum for Stocks Commodities & Forex; What
is PAN & how do I get a PAN What is PAN ? Permanent .

Weitere ähnliche Inhalte

Mehr von Sonu Khanna

Communication skills
Communication  skillsCommunication  skills
Communication skillsSonu Khanna
 
Bedi bedi final final (1)
Bedi bedi final final (1)Bedi bedi final final (1)
Bedi bedi final final (1)Sonu Khanna
 
ਚਲਾਕ ਲੂੰਬੜੀ
ਚਲਾਕ ਲੂੰਬੜੀਚਲਾਕ ਲੂੰਬੜੀ
ਚਲਾਕ ਲੂੰਬੜੀSonu Khanna
 
Shaheed bhagat singh
Shaheed bhagat singhShaheed bhagat singh
Shaheed bhagat singhSonu Khanna
 
Mata gujri ji...ekta
Mata gujri ji...ektaMata gujri ji...ekta
Mata gujri ji...ektaSonu Khanna
 
Lesson plan baisakhi
Lesson plan baisakhiLesson plan baisakhi
Lesson plan baisakhiSonu Khanna
 
Lesson plan application
Lesson plan applicationLesson plan application
Lesson plan applicationSonu Khanna
 
Lesson 2nd pollution
Lesson 2nd pollutionLesson 2nd pollution
Lesson 2nd pollutionSonu Khanna
 
Promotion in marketing
Promotion in  marketingPromotion in  marketing
Promotion in marketingSonu Khanna
 
Female foeticide in india
Female foeticide in indiaFemale foeticide in india
Female foeticide in indiaSonu Khanna
 

Mehr von Sonu Khanna (20)

Ekamjot x a
Ekamjot x aEkamjot x a
Ekamjot x a
 
Communication skills
Communication  skillsCommunication  skills
Communication skills
 
Cloud computing
Cloud  computingCloud  computing
Cloud computing
 
Bedi bedi final final (1)
Bedi bedi final final (1)Bedi bedi final final (1)
Bedi bedi final final (1)
 
PPT
PPTPPT
PPT
 
ਚਲਾਕ ਲੂੰਬੜੀ
ਚਲਾਕ ਲੂੰਬੜੀਚਲਾਕ ਲੂੰਬੜੀ
ਚਲਾਕ ਲੂੰਬੜੀ
 
Sst2
Sst2Sst2
Sst2
 
Shaheed bhagat singh
Shaheed bhagat singhShaheed bhagat singh
Shaheed bhagat singh
 
Mata gujri ji...ekta
Mata gujri ji...ektaMata gujri ji...ekta
Mata gujri ji...ekta
 
Mahatmagandh
MahatmagandhMahatmagandh
Mahatmagandh
 
Lesson plan3
Lesson plan3Lesson plan3
Lesson plan3
 
Lesson plan baisakhi
Lesson plan baisakhiLesson plan baisakhi
Lesson plan baisakhi
 
Lesson plan application
Lesson plan applicationLesson plan application
Lesson plan application
 
Lesson plan 4
Lesson plan 4Lesson plan 4
Lesson plan 4
 
Lesson 2nd pollution
Lesson 2nd pollutionLesson 2nd pollution
Lesson 2nd pollution
 
ChiildlabouR
ChiildlabouRChiildlabouR
ChiildlabouR
 
Promotion in marketing
Promotion in  marketingPromotion in  marketing
Promotion in marketing
 
Female foeticide in india
Female foeticide in indiaFemale foeticide in india
Female foeticide in india
 
Greedy dog
Greedy dogGreedy dog
Greedy dog
 
Gd
GdGd
Gd
 

Kürzlich hochgeladen

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Kürzlich hochgeladen (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Computer netword, types , name

  • 1. COMPUTER OF PROJECT Submitted to Submitted By Name : Prabhasis singh Class : VII green Roll no : -13 Computer Network
  • 2. The computers are connected in a network to exchange information and data. The computers connected in a network can also use resources of other computers. NETWORK HARDWARE
  • 3. Network hardware is the individual components of a network system that are responsible for transmitting data and facilitating the operations of a computer network. Although a network contains many hardware components, there are several basic categories that make up the complete operations of a network system. Network topology Bus Topology: A bus topology is a type of network setup where each computer and network device is connected to a single cable or backbone.
  • 4. Below, is a visual example of a simple computer setup on a network using the bus topology. Star topology: Each of the devices and computers on a network connect to a central hub. A major disadvantage of this network topology is that if the central hub fails, all computers connected to that hub would be disconnected. Below is a visual example of a simple computer setup on a network using the star topology. Ring Topology: Alternatively referred to as a ring network, the ring topology is a computer network configuration where each network computer and device are connected to each other forming a large circle (or similar shape). Each packet is sent around the ring until it reaches its final destination. Today, the ring topology is seldom used. Below is a visual example of a simple computer setup on a network using a ring topology. LAN –Local Area Network WAN-Wide Area Network MAN- Metropolitan Area Network CAN-Campus area Network, Controller Area Network,or Some times Cluster area Network PAN- Personal Area Network
  • 5. LAN: A local area network (LAN) consists of two or more computers connected together in a building or home using software and hardware. This is contrasted to a wide area network (WAN) such as the Internet, which covers a large geographic area. In a LAN, there is a main computer or server, and remote computers called clients. WAN: Wide Area Network, WAN is a collection of computers and network resources connected via a network over a geographic area. WideArea Networks are commonly connected either through theInternet or special arrangements made with phone companies or other service providers. A WAN is different from a MAN because of the distance between each of the networks. In a WAN, one network may be anywhere from several hundred miles away, to across the globe in a different country MAN:, A metropolitan area network (MAN) is a network that interconnects users with computer resources in a geographic area or region larger than that covered by even a large local area network (LAN) but smaller than the area covered by a wide area network (WAN) CAN:A Controller Area Network (CAN) refers to a network of independent controllers. It is a serial communications protocol that efficiently supports distributed real-time control with a very high level of security. The CAN bus standard was developed by Bosch and Intel a PAN: What is PAN & how do I get a PAN at the General Chit Chat within the Traderji.com - Discussion forum for Stocks Commodities & Forex; What is PAN & how do I get a PAN What is PAN ? Permanent .