SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Downloaden Sie, um offline zu lesen
Internet
I have Affiliate Marketing 2.0 The Fast Track Formula.
COURSE Digital Another download prod available click on
this link.
A computer network is a digital telecommunications network that allows
network nodes to share resources. In computer networks, computer
devices exchange data with each other using connections (data links)
between nodes. These data links are established via network cables
such as wire or fiber optics, or wireless media such as Wi-Fi.
Network computing devices that launch, route, and terminate data are
called network nodes. [1] Nodes are often identified by network
addresses and can include network hosts such as personal computers,
phones, and servers, as well as network hardware such as routers and
switches. Two such devices are interconnected when one can
exchange information with the other, whether they are directly
connected or not. In most cases, application-specific communication
protocols are layered (i.e., carry a payload ) over other general
communication protocols. This formidable collection of information
technology requires skilled network managers to keep all network
systems running well.
Computer networks support a large number of applications and services
such as access to the World Wide Web, digital video, digital audio,
shared use of storage and application servers, printers, and computers.
fax, and use email and instant messaging applications as well as many
other applications. Computer networks differ in terms of the
communication methods used to carry signals, communication protocols
to organize network traffic, size of the network, topology, traffic control
mechanisms, and organizational intent. network. The most famous
computer network is the Internet.
History of computers
Computers of the 1940s were large and fragile electromechanical
devices. The invention of the semiconductor transistor in 1947 created
the opportunity to make computers smaller and more reliable.
In 1950, mainframe computers running programs written on punched
cards began to be used in large institutions. Although this creates many
advantages for computers that can be programmed, it also has many
difficulties in creating programs based on these punched cards. [2]
In the late 1950s, people invented integrated circuits (ICs) containing
many transistors on a small semiconductor model, creating a giant leap
in creating more powerful, faster, and smaller computers. To date, ICs
can contain millions of transistors across multiple circuits. I have
Resell Right eBooks Digital and other download products
available click on this link.
In the late 1960s and early 1970s, small computers called
minicomputers began to appear. [3]
In 1977, the computer company Apple Computer introduced computers,
also known as personal computers ( personal computers - PC). [4]
In 1981, IBM launched the first personal computer. The ever-increasing
miniaturization of ICs led to the widespread use of personal computers
in the home and business.
In the mid-1980s, users of stand-alone computers began sharing files
using modems connected to other computers. This method is called
point-to-point, or dial-up transmission. This concept is expanded by
using computers as communication centers in a dial-up connection.
These computers are called bulletin boards. Users connect to this
messaging platform, leaving or removing messages, as well as
uploading and downloading files. The limitation of the system is that
there are very few directions of communication, and only to those who
know about that notification platform. In addition, the computers on the
notice floor need a modem for each connection. As the number of
connections increases, the system cannot meet the demand.
Through the 1950s, 1970s, 1980s, and 1990s, the US Department of
Defense developed highly reliable WAN-wide area networks to serve
military and scientific purposes. This technology is different from
point-to-point communication. It allows multiple computers to connect
using different paths. The network itself determines how data moves
from one computer to another. Instead of being able to communicate
with only one computer at a time, it can communicate with multiple
computers at the same time using the same connection. Later, the US
Department of Defense's WAN became the Internet.
I have Chat GPT Blueprint Digital Ebooks available click on
this link.
Network computational model
Centralized computing model
All processing takes place at the central computer. Terminals are
networked to the central computer and only act as data input and output
devices allowing users to view on the screen and enter data via the
keyboard. Terminal workstations do not store and process data. The
above network computing model can be deployed on a hardware
system or software installed on the server.
Advantages: Data is safe, easy to back up, easy to remove viruses, and
low installation costs.
Disadvantages: Difficult to meet the requirements of many different
applications, slow access speed.
Distributed computing model
Computers can operate independently, and tasks are broken down and
assigned to many different computers in the network instead of
concentrating on processing on a central computer. Although data is
processed and stored locally, these computers are networked together
to exchange data and services.
Advantages: Fast access, mostly unlimited applications.
Disadvantages: Fragmented data storage is difficult to synchronize, and
back up and is very susceptible to viruses.
Collaborative computing model
The collaborative network computing model involves multiple computers
that can cooperate to perform a job. One computer can borrow the
computing and processing capacity of another computer by running
programs on computers on the network.
Advantages: Very fast and powerful processing, can be used to run
applications with large mathematical operations and large data
processing. For example: cracking code systems, calculating DNA,...
Disadvantages: Data is stored in different locations so it is difficult to
synchronize and back up, and the possibility of virus infection is very
high. I have Full-Stack Web Development In 7 days Ebook
Digital Ebooks available click on this link.
Network classification
LAN
LAN ( English: Local Area Network ), also known as "local area
network", is a private network in a building, an area (school or office, for
example) about a few kilometers in size. [5] They connect servers and
workstations in offices and factories to share resources and exchange
information. LAN has 3 characteristics:
The limited range of operation ranges from a few meters to 1 km.
They are often using a simple technique with only one cable connecting
all machines. Typical data transfer speeds are 10 Mbps, 100 Mbps, 1
Gbps, and more recently 100 Gbps. [6]
Three common LAN-type network architectures include:
Bus network or linear network. The machines are connected
continuously in a row from one machine to the other. An example is
Ethernet ( IEEE 802.3 standard ).
Ring network. The machines are connected as above and the last
machine is connected back to the first machine to form a closed loop.
For example, the IBM token ring network ( IBM token ring ).
Star network.
MAN
MAN ( English: Metropolitan Area Network ), also known as
"metropolitan network", is a network larger than LAN, with a range of
several kilometers. It can consist of groups of offices close together in a
city, it can be public or private and has the following characteristics. I
have the Godot Game Development Machine Learning
Masterclass Digital membership area available click on this
link
There are only a maximum of two connecting cables.
Do not use transfer techniques.
Can support general data transport and voice, or even television. Today
people can use fiber optic technology to transmit signals. Current
speeds can reach 10 Gbps.
An example of this technique is a DQDB ( Distributed Queue Dual Bus )
network, also known as a distributed dual bus (IEEE 802.6 standard).
WAN
Types of connections in WAN
WAN ( English: Wide Area Network ) is also known as a "wide area
network", used in large geographical areas, usually for countries or
entire continents, with a range of several hundred to several thousand
kilometers. They consist of collections of machines intended to run
programs for users. These machines are often called storage machines
( hosts ) or also called servers or end systems. The main machines are
connected by communication subnets, or more simply, subnets. The
task of the subnet is to transmit messages from one server to another. I
have The Complete Python, Machine Learning, AI Mega
Bundle+ Digital membership area available click on this link.
Subnets usually have two main components:
Transport lines are also called circuits, channels, or trunks.
Connecting devices. This is a specialized type of computer used to
connect two or more trunk lines to move data between computers.
When data arrives on the input lines, the switching device must select
(according to a predetermined algorithm) an output line to send that
data. The name of this device is a packet-switching node or
intermediate system. The computer used for the connection is called a
"path selector" or "router".
Most WANs consist of multiple cables or phone lines, each connected to
a pair of routers. If two routers are not connected to the same line, they
will communicate indirectly through many other intermediate routers.
When the router receives a data packet, it holds the packet until the
outgoing line needed for that packet is free, then it forwards the packet.
This case is called the point-to-point subnetwork principle, or the
store-and-forward subnetwork principle, or the packet-switching
subnetwork principle.
There are many types of WAN configurations using the point-to-point
principle such as star, ring, tree, complete, ring, or irregular.
Network model
Main article: Network topology
Star Network
There are all stations connected to a central device that is responsible
for receiving signals from the stations and transferring them to the
destination station. Depending on the communication requirements of
the network, the central device can be a hub, switch, router, or central
server. The role of the central device is to establish Point-to-Point links.
I have The Complete Excel, AI, and Data Science Mega
Bundle Digital membership area available click on this link.
The advantages are simple network setup, easy network reconfiguration
(add or remove stations), easy control and troubleshooting, and full
advantage of the transmission speed of the physical connection.
The disadvantage is that the transmission line length connecting a
station to the central device is limited (a radius of about 100m with
current technology).
Bus Network
Have all stations divided on a common line (bus). The main
transmission line is limited at both ends by two special connectors
called terminators. Each station is connected to the main axis via a
T-connector or a transceiver. The Bus network model operates on
point–to–m–multipoint or Broadcast links.
Advantages: Easy to design and low cost.
Disadvantages: Poor stability, just one network node fails and the entire
network stops working.
Ring Network
The signal is transmitted on the ring in only one direction. Each station
of the network is connected through a repeater, which is responsible for
receiving the signal and then forwarding it to the next station on the ring.
Thus the signal is circulated on the ring in a consecutive series of
Point-to-Point links between repeaters.
Advantages: Ring networks have the same advantages as star
networks.
Disadvantages: One broken station or cable means the entire network
stops working, adding or removing a station is more difficult, and the
network access protocol is complicated.
Mesh Network
Star and linear combination (Star Bus Network): This type of network
configuration has a signal splitter (splitter) acting as a central device,
and the network cabling system is configured as Star Topology and
Linear Bus Topology. The advantage of this configuration is that the
network can consist of many groups working far away from each other.
ARCNET is a combined Star Bus Network. This configuration offers
flexibility in wire layout to easily adapt to any building.I have The
Complete AI Digital Artist Masterclass Digital membership
area available click on this link.
Star and ring combination (Star Ring Network): Configure the Star Ring
Network combination, there is a communication "card" (Token) that is
transferred around a central HUB. Each workstation is connected to a
HUB - a bridge between workstations to increase the necessary
distance.
Ring network Linear network
Communication methods
Circuit Switching Network
Main article: Channel switching
When two stations need to exchange information with each other, a
fixed "channel" will be established between them and maintained until
one of the two parties disconnects. Data is only transmitted along this
fixed path. Circuit switching techniques are used in ATM (Asynchronous
Transfer Mode) and Dial-up ISDN (Integrated Services Digital Networks)
connections. An example of a circuit-switched network is the telephone
network.
The advantage is that the transmission channel is reserved during the
communication process, so data transmission speed is guaranteed.
This is especially important for real-time applications such as audio and
video.I have Kids Coding: Unlock the World of Programming
Digital membership area available click on this link.
The disadvantage is that it takes time to establish a fixed connection
between two stations; The transmission efficiency is not high, because
there are times when there is no data transmission on the channel from
the two connected stations, but other stations are not allowed to use
this channel.
Message Switching Network
Unlike circuit switching, message switching does not establish a
dedicated link between two communicating stations, instead, each
message is treated as an independent block containing both a source
and destination address. Each message will be transmitted through
stations in the network until it reaches the destination address, each
intermediate station will receive and store the message until the next
intermediate station is ready to receive the message then it forwards.
relays the message to the next station; for this reason, a
message-switching network can also be called a Store and Forward
Network. A typical example of this technique is electronic mail (e-mail),
which is relayed through stations until it reaches its destination.
The advantage is to provide a more efficient management of network
traffic, by assigning priorities to messages and ensuring that higher
priority messages are circulated instead of delayed due to traffic on the
network; Reduces network congestion, and intermediate stations can
store messages until the channel is free before sending messages;
Increase the efficiency of using the channel. With this technique,
stations can share the same channel.
The disadvantage is that the delay caused by storing and forwarding
messages is not suitable for real-time applications. Intermediate
stations must have a very large memory capacity to store messages
before forwarding them to another intermediate station (the size of
messages is not limited).
Packet Switching Network
Main article: Packet switching
This technique is proposed to take advantage of the advantages and
overcome the disadvantages of the above two techniques. For this
technique, messages are divided into packets of variable size, each
packet includes data, source address, destination address, and
information about intermediate station addresses. Individual packets do
not always follow a single path; this is called independent routing. I
have Complete Unity/Unreal/Godot ChatGPT, AI,
Development Bundle |Digital membership area available click
on this link.
The advantage is that bandwidth can be managed by splitting data into
different paths in case the channel is busy; If a link fails during
communication, the remaining packets can be sent via other paths; The
basic difference between message switching and packet switching is
that in packet switching, packets are limited in maximum length,
allowing switching stations to store packets. information into internal
memory without having to send it to external memory, thereby reducing
access time and increasing information transmission efficiency.
The disadvantage is that the difficulty of the packet switching method
that needs to be resolved is to gather packets at the receiver to recreate
the original message as well as handle packet loss.
Network application model
Peer–to–Peer-to-peer network model
Main article: Peer-to-peer network
Peer–to–peer networks are a very simple example of LANs. They allow
every network node to act as both an entity requesting network services
(client) and as an entity providing network services (server). In this
environment, users on each computer are responsible for operating and
sharing their computer's resources. This model is only suitable for small
organizations and does not care about security issues. Peer-to-peer
network software is designed so that peer entities perform the same
functions.
The characteristics of a peer-to-peer network are that a peer-to-peer
network is also known as a workgroup network and is used for networks
with ≤ 10 users working on that network. ; does not require a network
administrator; In a peer-to-peer network, each user acts as an
administrator for their workstation and chooses which resources or data
they will allow being shared on the network as well as who can access
them. those resources and data.I have a Hello Coding Anyone
Can Learn to Code Digital membership area available click on
this link.
The advantage is the simplicity of installation and relatively cheap cost.
The disadvantage is that there is no centralized administration,
especially in cases where there are multiple accounts for one user to
access different workstations; Network security can be violated with
users share the same username and password to access the same
resource and cannot centrally backup (backup) data. Data is stored
scattered on each station.
Client–Server Network / Server-Based Network model
Main article: Client-server
Client-host networking involves defining the roles of communication
entities within the network. This network determines which entities can
make service requests and which entities can service those requests.
Machines are organized into domains. Security on domains is managed
by several special servers called domain controllers. On the domain,
there is a master domain controller called PDC (Primary Domain
Controller) and a BDC (Backup Domain Controller) to prevent PDC
problems.
Network management model
Workgroup network model
The Workgroup network model is a group of network computers that
share resources such as data files and printers. It is a logical group of
computers that all have the same group name. There can be many
different workgroups connected on a local area network (LAN).
The Workgroup network model is also considered a peer-to-peer
network because all machines in the workgroup have equal rights to
share resources without needing to be specified by the Server. Each
computer in the group maintains and secures its local database. This
means that all administration of user accounts and security of shared
resources are not centralized. You can connect to an existing group or
create a new group.
I have Google Bard AI Expertise Digital Ebooks available click
on this link.
The advantage is that Workgroups do not require a computer running
on the Windows Server operating system to centralize security
information; Workgroups are simple to design and implement and do not
require the extensive planning and administration that a domain
requires; Workgroups are convenient for groups with a small number of
computers that are close together (≤ 10 computers).
The downside is that each user must have a user account on each
computer they want to log in to; Any user account changes, such as
changing a password or adding a new user account, must be made on
all computers in the Workgroup, if you forget to add a new user account
to a computer. within the group, new users will not be able to log in to
that computer and will not be able to access that computer's resources;
Device and file sharing is handled by individual computers, and can only
be used by users with accounts on that computer.
Domain network model
Main article: Domain name
A domain network model is a group of network computers sharing a
centralized directory database. The data directory contains user
accounts and security information for the entire Domain. This data
directory is known as the active directory.
In a Domain, directories only exist on computers configured as domain
controllers. A domain controller is a Server that manages all security
aspects of the Domain. Unlike Workgroup networks, security and
administration in the domain are centralized. To have a Domain
controller, servers must run a Domain controller service (a service built
into Microsoft's Windows Server versions; or on Linux, we configure the
Samba service to perform the Domain controller task). ,...).
A domain is not considered a single location or separate network
configuration. Computers in the same domain can be on a LAN or WAN.
They can communicate with each other via any physical connection,
such as Dial-up, Integrated Services Digital Network (ISDN), Ethernet,
Token Ring, Frame Relay, Satellite, and Fiber Channel.I have
Extraordinary Parenting Digital Ebooks available click on this
link.
The advantage is that it allows centralized administration. If a user
changes their password, the change is automatically updated across
the Domain; Domains provide a simple login process for users to
access the network resources they are authorized to access; Domain
provides flexibility so administrators can create very large networks.
Typical domains in Windows Server may contain the following computer
models:
Domain controllers store and maintain directory replicas. In a domain, a
user account is created once, Windows Server records it in this
directory. When a user logs in to a computer in the domain, the domain
controller checks the directory for the user name, password, and login
restrictions. When there are multiple domain controllers, they
periodically regenerate their directory information.
Member servers: A member server is a server that is not configured as
a domain controller. The server does not store directory information and
cannot verify the user's domain. Servers can provide shared resources
such as shared folders or printers.
Client computers: Client computers run an operating system for the
user's workstation and allow users to access resources in the domain.
Unlike Workgroup, Domain must exist before users join it. Joining a
Domain always requires the Domain administrator to provide an
account for the user's computer to that domain. However, if the
administrator gives the user the correct privileges, the user can create
his or her computer account during the installation process.
Network parameters
Bandwidth (Bandwidth - B)
In computer technology, bandwidth is a quantity used to refer to the
amount of data that can be transmitted in a certain time. For digital
devices, bandwidth is calculated in bps (bits per second) or Bps (bytes
per second).
Latency (Latency - L)
Latency is the time it takes to transfer a message from one node to
another in the network.
Throughput – T
Throughput is the amount of data passing through a link in a unit of
time. Or throughput is the actual bandwidth used by network
applications during a specific time (throughput can be time-varying). I
have COACHY Your member area with landing page builder
Digital membership area available click on this link.
Throughput is usually much smaller than the maximum possible
bandwidth of the transmission medium used (Throughput ≤ Bandwidth).
The throughput of a computer network depends on factors such as link
distance, transmission environment, network technologies, type of data
transmitted, number of users on the network, user computers, servers,
etc.
Data communication methods
Main article: Network node
Unicast method: A source node wants to send a message to only one
destination node on the network.
Multicast method: A source node wants to send a message to a group
of destination nodes on the network.
Broadcast method: A source node wants to send a message to all other
destination nodes on the network.
Network protocols
I have the Affiliarena Digital membership area available click
on this link.
Main article: Communication protocol
Main article: TCP/IP
Typical network models
The following models, TCP/IP and OSI, are standards, not filters or
protocol generators.
OSI
OSI model with seven layers.
OSI, also known as the "Open Systems Interconnection Reference
Model", abbreviated as OSI Model or OSI Reference Model is a design
based on the development of ISO (International Organization for
Standardization) and IUT-T. The model includes 7 floors:
Application layer (Layer 7): allows users (human or software) to access
the network by providing a user interface, supporting services such as
remote access email and file transfer, shared database management,
and several other information services.
Presentation layer (Layer 6): performs tasks related to the syntax and
content of sent information.
Session layer (Layer 5): plays the role of " dialog " controller of the
network with the task of establishing, maintaining, and synchronizing
the interaction between the two parties.
Transport layer (Layer 4): receives data from the session layer, cuts
them into small units if necessary, sends them to the network layer, and
checks that these units reach the receiving end.
Network layer (Layer 3): controls the operation of the subnet.
Determines the beginning and end of a data transfer.
Data link layer (Layer 2): the main task is to convert data into data
frames according to algorithms to detect, adjust, and solve problems
such as damage and loss. and duplicate data frames.
Physical layer (Layer 1): Performs the functions necessary to transmit
data streams in the form of bits across physical media.
TCP/IP
TCP / IP is like OSI but this one has three fewer layers:
The application layer: includes many high-level protocols. Previously,
people used virtual terminal applications such as TELNET, FTP, and
SMTP. Later, many additional protocols were defined such as DNS, and
HTTP. I have ChatGPT Command Bible Digital - Ebooks
available click on this link.
Transport layer: the task is the same as the transport part of OSI but
there are two protocols used: TCP and UDP.
Network layer: responsible for transferring data packets from sender to
receiver. Data packets may have to go through many networks
(intermediate hops). The data link layer transfers data packets between
two devices on the same network, while the network layer ensures that
the data packet will be transferred from the sender to the correct
recipient. This layer defines a packet format and protocol called IP.
Data link layer: Used to transmit data packets across a physical
medium.
Network devices
Main article: Terminal system
Transmission equipment
Twisted pair cable: Twisted pair cable consists of many pairs of copper
wires twisted together to prevent electromagnetic interference emission.
Due to its low price, twisted-pair cables are widely used. There are two
types of twisted pair cables widely used in LAN: shielded and
unshielded.
Coaxial Cable
Fiber optic cable: a type of telecommunications cable made of glass or
plastic, using light to transmit signals. The fiber optic cable is long, thin,
and composed of transparent glass about the diameter of a human hair.
They are arranged in bundles called fiber optic cables and are used to
transmit signals over very long distances. Unlike copper cables that
transmit signals electrically, fiber optic cables are less susceptible to
interference, have higher speeds, and transmit farther.I have an
Online Business mit Google Bard Digital membership area
available click on this link.
Connected devices
Wireless Access Point is a wireless network connection device
designed according to IEEE 802.11b standards, allowing LAN to LAN
connection, using CSMA/CA mechanism to resolve disputes, using both
Infrastructure and Network connection architectures. AdHoc, 64/128 bit
encryption. It also supports wireless transmission speeds of up to
11Mbps on the 2.4 GHz band and uses DSSS (Direct Sequence
Spectrum Spreading) radio technology.
Wireless Ethernet Bridge is a device that allows Ethernet devices to
connect to a wireless network. For example, the Linksys WET54G
Wireless-G Ethernet Bridge device. It supports any Ethernet device
connecting to a wireless network whether that Ethernet device can be a
single device or a router connected to many other devices.
A network card is a type of expansion card attached to a computer,
providing physical and logical communication between the computer
and network devices and network systems through transmission media.
A repeater is simply a signal amplifier between two ports of two network
segments. Repeaters are used in the Bus network model to extend the
maximum distance on a cable line. There are two types of Repeaters in
use: Electric Repeaters and Optical Repeaters. Used to connect two
networks with the same communication protocol
Hub is a device with the same function as a Repeater but with more
communication ports allowing many network devices to connect at one
point. Hubs typically have from 4 to 24 communication ports, often used
in 10BaseT Ethernet networks. Hub is just a multi-port Repeater. The
hub repeats any signal received from any one port and sends that
signal to all remaining ports on it. Hubs operate at the physical layer of
the OSI model and also do not filter data. Hubs are often used for
networking, through their plugs people connect to computers in star
form. Hubs are divided into two main types: Passive hubs and Active
hubs.I haveSucceX Business Success on the microblogging
platform X Digital membership area is available click on this
link.
A bridge is a device that allows connecting two network branches, with
the function of selectively transferring packets to the network branch
containing the packet recipient. To filter packets and know which packet
belongs to which network branch, the Bridge must contain a MAC
address table. This address table can be created automatically or must
be configured manually. Because the Bridge understands the MAC
address, the Bridge operates at the second layer (data link layer) in the
OSI model.
A modem is a device used to convert digital format data into analog
format data for a transmission process from a digital signal medium
through an analog signal medium and then back to a digital signal
medium at the receiving end. Final. The name Modem is an acronym
composed of the first letters of MOdulator/DEModulator -
Modulator/Demodulator.
A switch is a harmonious technical combination between a Bridge and a
Hub. The operating mechanism of a Switch is very similar to a Hub
because it is a device that centralizes network connections on it. The
communication ports on the Switch are miniature bridges built on each
corresponding communication port.
A router is a router used to connect multiple network segments, or
multiple network types (usually heterogeneous in architecture and
technology) into the same interactive network. Typically there is a
processor, memory, and two or more input/output ports.
Brouter
Gateway is an intermediary device used to connect different networks in
both architecture and network environment. A gateway is understood as
the main entrance port of an internal network connecting to another
external network. It may be a specialized hardware device, but it is
usually a server that provides connections for the machines it manages
to communicate with another network.
Network technologies
Point-To-Point
Main article: Point-To-Point
Ethernet
Main article: Ethernet
Token Ring
Main article: Token Ring
FDDI
Main article: FDDI
In essence, FDDI is like Token Ring, but double Token Ring. That
means FDDI has 2 Token Rings, but, only 1 ring is active, and 1 ring is
used as a backup in case the other ring goes down.I have Insta AI
Copy Paste Business | Digital - membership area available
click on this link.
FDDI ensures LAN operates effectively, without downtime, and provides
higher security.
Subscriber network
Main article: Subscriber network
Switched network
Main article: Switched network
ATM
ATM(Asynchronous Transfer Mode) is a packet switching technology
compatible with all types of services today. It is used in both the access
network and the core network. Operates at layer 2 datalink of OSI
-The data to be sent is divided into packets with a fixed length of 53
bytes, called a cell.
X.25
X.25 is a protocol recognized by CCITT ( English acronym: Consultative
Committee for International Telegraph and Telephone). This protocol is
a very popular protocol introduced to ensure the integrity of data when
traveling in the network. It defines the interconnection of multiple
networks using packet-switching techniques with associated computers
or outputs. X.25 allows computers on many different public networks to
communicate through an intermediate computer at the network layer.I
have Affiliate-Marketing A-Z der Gurus Digital Ebooks
available click on this link.
Frame relay
Frame relay is a packet-switching protocol used to connect devices in a
WAN. This protocol was created for use in very fast environments with
little chance of error. In the US, it supports T-1 (or DS1) speeds up to
1,544 Mbps. Frame relay is essentially based on the old X.25 protocol.
The difference is that frame relay is a "fast-packet" technique and this
technique will not perform error correction. When an error is found, it
simply drops the packet with the error. The terminals are responsible for
detecting errors and requesting resends of aborted packets.
DSL
Main article: DSL
Main article: ADSL
Main article: HDSL
Main article: RADSL
Main article: VDSL
Novell Netware
Main article: Novell Netware
Windows NT
Main article: Windows NT
Apple Talk
Main article: Apple Talk
ARPANET
ARPANET is a WAN-style network, nse ) initiated in the early 1960s to
create a network that could survive a possible nuclear war between the
United States and the Soviet Union. The word ARPANET is a
combination of the words Advance Research Project Agency and the
word NET. This was one of the first networks to use packet-switching
technology, it consisted of subnets and multiple masters. Subnets are
designed using minicomputers called IMPs, or Interface Message
Processors, (from the word Interface Message Processor ) to ensure
communication capabilities, each IMP must connect to at least two
other IMPs and call the software of these subnets the IMP-IMP protocol.
The IMPs are connected by existing 56 Kbps telephone lines.
ARPANET has developed very strongly thanks to the support of
universities. Many other protocols have been tested and applied on this
network, the most important of which is the invention of the TCP/IP
protocol used in LANs connected to ARPANET. By 1983, ARPANET
had proven resilient and successful, including more than 200 IMPs and
hundreds of mainframes. Also in the 1980s, many LANs were
connected to ARPANET, and the design of DNS, or domain naming
system, (from the word Domain Naming System ) was also born on this
network first. By 1990, this network was no longer in use. This is
considered a historic network and the predecessor of the Internet.
NFSNET
In 1984, the National Science Foundation of the United States (NSF)
was designed to serve the research and information needs between
universities, including 6 supercomputers from many centers spread
throughout the United States. This was the first WAN to use TCP/IP. In
the late 1990s, fiber optics technology was applied. In December 1991,
the National Research and Educational Network was born to replace
NSFNET and used speeds up to gigabits. By 1995, NSFNET was no
longer needed.
Internet
The number of computers connected to the ARPANET increased rapidly
after TCP/IP became the sole official interface on January 1, 1983. After
ARPANET and NSFNET were connected, network development
increased exponentially. Many parts of the world began connecting to
form networks in Canada, Europe, and across the Atlantic Ocean,
forming the Internet. Since 1990, the Internet has had more than 300
networks and 2,000 computers connected. By 1995 there were
hundreds of medium-sized networks, tens of thousands of LANs,
millions of mainframes, and tens of millions of Internet users. Its size
doubles every two years. I have the Das Home Office Cash Paket
Digital membership area available click on this link.
The main fabric that holds the Internet together is the TCP/IP protocol
and the TCP/IP interface stack. TCP/IP made services ubiquitous. By
January 1992, the spontaneous development of the Internet was no
longer effective. The Internet Society was born to promote and manage
it. The Internet has the following main applications:
Electronic mail ( email ): provides the ability to write, send and receive
emails.
Newsgroup: forums for users to exchange information. There are tens
of thousands of such groups and each has its style and style.
Remote login: helps users anywhere can use the Internet to log in and
use or control another computer where they have an account. Famous
is the Telnet program.
File transfer: use the FTP program to transfer files over the Internet
everywhere.
Search engines, these programs over the Internet, can help people
find information in all forms and levels about anything. From finding
in-depth research documents to finding people and information about
that person, or finding directions on maps,
Wireless network
Black laptop with the router in the background
Computers are very often connected to networks using wireless links
Main article: Wireless network
Handheld or pocket-sized devices can often communicate with each
other wirelessly and in a LAN fashion. Another option used for cell
phones is based on the CDPD ( Cellular Digital Packet Data ) protocol
or digital cellular packet data.
Wireless devices can completely connect to a regular (wired) network to
form a mixed network (equipped on some passenger aircraft. I have AI
Cash Klub Earn money with artificial intelligence Digital
membership area available click on this link.
Internet
Main article: Internet connection
Networks around the world may differ in hardware and software, so for
them to communicate with each other, a device called a gateway is
required to coordinate the task. A set of interconnected networks is
called an internetwork. The most common form of internetworking is a
collection of multiple LANs connected by a WAN. I have Avatar
Speak Pro Lifelike KIAvatars for more conversion Digital
software available click on this link.
Main article: Internet connection
Networks around the world may differ in hardware and software, so for
them to communicate with each other, a device called a gateway is
required to coordinate the task. A set of interconnected networks is
called an internetwork. The most common form of internetworking is a
collection of multiple LANs connected by a WAN.
ISDN
Main article: PSTN
Main article: ISDN
ISDN comes from the word Integrated Services Digital Network,
meaning "digital network of integrated services". In general, ISDN is a
type of network that uses circuit-switched connection technology. ISDN
is an international standard for digital audio, data, signal, and video
communications. For example, it can be used for video conferences to
simultaneously exchange images, sounds, and text between personal
computers connected to a group of video conferencing systems.
The ISDN system uses connections over digital telephone lines to allow
multiple channels to operate simultaneously over a single interface
standard. Users at home and in economic establishments who want to
have ISDN via a digital telephone line system need to install special
hardware equipment called adapters. ISDN's current maximum speed is
up to 128 Kbps. Many localities that are not equipped with digital
telephone lines will not be able to install ISDN technology.
Organizations influencing network standardization
Organizations with major influence or authority on computer network
standardization:
ISO "International Organization for Standardization"
ANSI "American National Standards Institute"
IEEE "Institute of Electrical and Electronics Engineers"
ITU "International Telecommunication Union" I have Internet Money
Secrets Digital other download products available click on this
link.
Social issues
Relationships between people becoming faster, easier, and closer also
bring many social problems that need to be solved such as:
Abusing the network system to do illegal or unethical things:
Organizations of human trafficking, pornography, fraud, or cybercrime,
hacking organizations to steal property of citizens and agencies,
terrorist organizations.
The larger the network, the easier the risk of spreading malicious
software (malware).
The trading system becomes more difficult to control but also creates
conditions for fiercer competition.
One problem that arises is defining the border between the control of
public employees and their private property rights. (The owner wants full
control over emails or online chats, but this can seriously violate
personal rights.)
The problem of educating teenagers also becomes more difficult
because they can participate in activities online that are difficult for
parents to control.
More than ever with fast communication media, freedom of speech or
abuse of speech rights can also have a more profound impact than
before as is the case with advertising software ( adware ) and spam
emails. junk ( spam mail ).
The development of computer network systems brings many benefits to
society such as. I have ChatGPT The AI all-rounder for your
everyday life Digital Ebooks are available click on this link.
Many people can share the same utility software.
If a group of people working on a project are connected to the network,
they will share the project's data, share the project's master file, and
exchange information with each other easily.
Data is centrally managed so it is secure, exchange between users is
convenient and fast, and data backup is better.
Shared use of printers, scanners, hard disks, and other devices.
Users exchange information easily with each other through electronic
mail service (Email), Chat services, file transfer services (FTP), and
Web services.
Eliminate barriers of geographical distance between computers in the
network that want to share and exchange data with each other.
Some users do not need to be equipped with expensive computers (low
cost but strong functions).
Allows programmers in one computer center to use utility programs and
memory areas of another computer center that are idle to increase the
economic efficiency of the system.
Safe for data and software because it manages access rights of user
accounts (depending on network administrators).
References
^ Computer network definition
^ John Kopplin (2002). “An Illustrated History of Computers: Part 4” .
ComputerScienceLab.
^ “DEC released its first mini computer: PDP-1” .
^ Tom Owad (May 22, 2004). “October 1977 Price List” .
^ New global standard for fully networked home, ITU-T, 12 December
2008, Archived from the original on 21 February 2009, retrieved 12
November 2011
^ IEEE P802.3ba 40Gb/s and 100Gb/s Ethernet Task Force, accessed
November 12, 2011,
Read more
Cisco Professional Certificate
Microsoft Professional Certificate
Banking network system
Join-transfer technique
I have Affiliate School Masterclass Partnerprogramm Digital
membership area available click on this link.
Further research
Tanenbaum, Andrew S. Computer Networks. 3rd ed. Prentice Hall PTR.
ISBN 0-13-066102-3.
Shelly, Gary, et al. "Discovering Computers" 2003 Edition
Cisco Systems, Inc., (2003, March 14). CCNA: network media types.
Accessed from ciscopress.com
Wendell Odom, Rus Healy, Denise Donohue. (2010) CCIE Routing and
Switching. Indianapolis, IN: Cisco Press
Kurose James F and Keith W. Ross: Computer Networking: A
Top-Down Approach Featuring the Internet, Pearson Education 2005.
Andrew S. Tanenbaum, Computer Networks, Fourth Edition, Pearson
Education 2006 ( ISBN 0-13-349945-6 ).
William Stallings, Computer Networking with Internet Protocols and
Technology, Pearson Education 2004.
Important publications in computer networks
Vinton G. Cerf "Software: Global Infrastructure for the 21st Century"
Meyers, Mike, "Mike Meyers' Certification Passport: Network+" ISBN
0-07-225348-7 "
Odom, Wendall, "CCNA Certification Guide"
Network Communication Architecture and Protocols: OSI Network
Architecture 7 Layers Model
External links
Wikimedia Commons has media related to Computer networks.
Easy Network Concepts (Linux kernel specific)
Computer Networks and Protocols (Research document, 2006)
Computer Networking Glossary Archived 2006-08-16 at the Wayback
Machine
Networking on DMOZ
Internet.pdf

Weitere ähnliche Inhalte

Ähnlich wie Internet.pdf

Computer Network Unit I RGPV
Computer Network Unit I RGPV Computer Network Unit I RGPV
Computer Network Unit I RGPV NANDINI SHARMA
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorialajaymane22
 
Data Communication & Network
Data Communication & NetworkData Communication & Network
Data Communication & NetworkMaulen Bale
 
Katie & toms_computer_network_project
Katie & toms_computer_network_projectKatie & toms_computer_network_project
Katie & toms_computer_network_projectkatiettoml
 
Computer Networking
Computer NetworkingComputer Networking
Computer NetworkingDeven Sahu
 
Network & Networking
Network & NetworkingNetwork & Networking
Network & NetworkingGohil Anshu
 
Setting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subjectSetting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subjectAnneilynLeal
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkammulu99
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorialRodel Morales
 
Data Communication & Computer Network
Data Communication & Computer Network Data Communication & Computer Network
Data Communication & Computer Network Faraz Ahmed
 
Computer networking project
Computer networking projectComputer networking project
Computer networking projectAshifimrankhan1
 
Computer network
Computer networkComputer network
Computer networkMd Saylab
 
Seminar report-networking
Seminar report-networkingSeminar report-networking
Seminar report-networkingJyoti Kumari
 
Basic concept of Computer networks
Basic concept of Computer networks Basic concept of Computer networks
Basic concept of Computer networks ShohanaakterKakon
 
What is a network
What is a networkWhat is a network
What is a networkRowan Nave
 

Ähnlich wie Internet.pdf (20)

Computer Network Unit I RGPV
Computer Network Unit I RGPV Computer Network Unit I RGPV
Computer Network Unit I RGPV
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorial
 
Basic lecture
Basic lectureBasic lecture
Basic lecture
 
Data Communication & Network
Data Communication & NetworkData Communication & Network
Data Communication & Network
 
Katie & toms_computer_network_project
Katie & toms_computer_network_projectKatie & toms_computer_network_project
Katie & toms_computer_network_project
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Network & Networking
Network & NetworkingNetwork & Networking
Network & Networking
 
Setting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subjectSetting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subject
 
Cn
CnCn
Cn
 
Cnetworks
CnetworksCnetworks
Cnetworks
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of network
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
Computer network
Computer networkComputer network
Computer network
 
Data Communication & Computer Network
Data Communication & Computer Network Data Communication & Computer Network
Data Communication & Computer Network
 
Computer networking project
Computer networking projectComputer networking project
Computer networking project
 
Computer network
Computer networkComputer network
Computer network
 
Seminar report-networking
Seminar report-networkingSeminar report-networking
Seminar report-networking
 
Basic concept of Computer networks
Basic concept of Computer networks Basic concept of Computer networks
Basic concept of Computer networks
 
What is a network
What is a networkWhat is a network
What is a network
 
Networking
NetworkingNetworking
Networking
 

Mehr von raufkhalid104

How do you evaluate everything related to a company to invest in it.pdf
How do you evaluate everything related to a company to invest in it.pdfHow do you evaluate everything related to a company to invest in it.pdf
How do you evaluate everything related to a company to invest in it.pdfraufkhalid104
 
How do you evaluate everything related to a company to invest in it.pdf
How do you evaluate everything related to a company to invest in it.pdfHow do you evaluate everything related to a company to invest in it.pdf
How do you evaluate everything related to a company to invest in it.pdfraufkhalid104
 
10 outstanding events in the healthcare industry in 2023.pdf
10 outstanding events in the healthcare industry in 2023.pdf10 outstanding events in the healthcare industry in 2023.pdf
10 outstanding events in the healthcare industry in 2023.pdfraufkhalid104
 
What is the product _ Things to know about product life cycle.pdf
What is the product _ Things to know about product life cycle.pdfWhat is the product _ Things to know about product life cycle.pdf
What is the product _ Things to know about product life cycle.pdfraufkhalid104
 
Prime Minister_ Building a healthy, stable, and sustainable business investme...
Prime Minister_ Building a healthy, stable, and sustainable business investme...Prime Minister_ Building a healthy, stable, and sustainable business investme...
Prime Minister_ Building a healthy, stable, and sustainable business investme...raufkhalid104
 
What is a Computer Network.pdf
What is a Computer Network.pdfWhat is a Computer Network.pdf
What is a Computer Network.pdfraufkhalid104
 
What is email marketing.pdf
What is email marketing.pdfWhat is email marketing.pdf
What is email marketing.pdfraufkhalid104
 
Lesson 10_ History of computer networks and the Internet.pdf
Lesson 10_ History of computer networks and the Internet.pdfLesson 10_ History of computer networks and the Internet.pdf
Lesson 10_ History of computer networks and the Internet.pdfraufkhalid104
 

Mehr von raufkhalid104 (10)

How do you evaluate everything related to a company to invest in it.pdf
How do you evaluate everything related to a company to invest in it.pdfHow do you evaluate everything related to a company to invest in it.pdf
How do you evaluate everything related to a company to invest in it.pdf
 
How do you evaluate everything related to a company to invest in it.pdf
How do you evaluate everything related to a company to invest in it.pdfHow do you evaluate everything related to a company to invest in it.pdf
How do you evaluate everything related to a company to invest in it.pdf
 
Media.pdf
Media.pdfMedia.pdf
Media.pdf
 
10 outstanding events in the healthcare industry in 2023.pdf
10 outstanding events in the healthcare industry in 2023.pdf10 outstanding events in the healthcare industry in 2023.pdf
10 outstanding events in the healthcare industry in 2023.pdf
 
What is the product _ Things to know about product life cycle.pdf
What is the product _ Things to know about product life cycle.pdfWhat is the product _ Things to know about product life cycle.pdf
What is the product _ Things to know about product life cycle.pdf
 
Prime Minister_ Building a healthy, stable, and sustainable business investme...
Prime Minister_ Building a healthy, stable, and sustainable business investme...Prime Minister_ Building a healthy, stable, and sustainable business investme...
Prime Minister_ Building a healthy, stable, and sustainable business investme...
 
Education.pdf
Education.pdfEducation.pdf
Education.pdf
 
What is a Computer Network.pdf
What is a Computer Network.pdfWhat is a Computer Network.pdf
What is a Computer Network.pdf
 
What is email marketing.pdf
What is email marketing.pdfWhat is email marketing.pdf
What is email marketing.pdf
 
Lesson 10_ History of computer networks and the Internet.pdf
Lesson 10_ History of computer networks and the Internet.pdfLesson 10_ History of computer networks and the Internet.pdf
Lesson 10_ History of computer networks and the Internet.pdf
 

Kürzlich hochgeladen

定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 

Kürzlich hochgeladen (20)

定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 

Internet.pdf

  • 1. Internet I have Affiliate Marketing 2.0 The Fast Track Formula. COURSE Digital Another download prod available click on this link. A computer network is a digital telecommunications network that allows network nodes to share resources. In computer networks, computer devices exchange data with each other using connections (data links) between nodes. These data links are established via network cables such as wire or fiber optics, or wireless media such as Wi-Fi. Network computing devices that launch, route, and terminate data are called network nodes. [1] Nodes are often identified by network addresses and can include network hosts such as personal computers, phones, and servers, as well as network hardware such as routers and switches. Two such devices are interconnected when one can exchange information with the other, whether they are directly connected or not. In most cases, application-specific communication protocols are layered (i.e., carry a payload ) over other general communication protocols. This formidable collection of information technology requires skilled network managers to keep all network systems running well. Computer networks support a large number of applications and services such as access to the World Wide Web, digital video, digital audio, shared use of storage and application servers, printers, and computers. fax, and use email and instant messaging applications as well as many other applications. Computer networks differ in terms of the communication methods used to carry signals, communication protocols to organize network traffic, size of the network, topology, traffic control mechanisms, and organizational intent. network. The most famous computer network is the Internet. History of computers
  • 2. Computers of the 1940s were large and fragile electromechanical devices. The invention of the semiconductor transistor in 1947 created the opportunity to make computers smaller and more reliable. In 1950, mainframe computers running programs written on punched cards began to be used in large institutions. Although this creates many advantages for computers that can be programmed, it also has many difficulties in creating programs based on these punched cards. [2] In the late 1950s, people invented integrated circuits (ICs) containing many transistors on a small semiconductor model, creating a giant leap in creating more powerful, faster, and smaller computers. To date, ICs can contain millions of transistors across multiple circuits. I have Resell Right eBooks Digital and other download products available click on this link. In the late 1960s and early 1970s, small computers called minicomputers began to appear. [3] In 1977, the computer company Apple Computer introduced computers, also known as personal computers ( personal computers - PC). [4] In 1981, IBM launched the first personal computer. The ever-increasing miniaturization of ICs led to the widespread use of personal computers in the home and business. In the mid-1980s, users of stand-alone computers began sharing files using modems connected to other computers. This method is called point-to-point, or dial-up transmission. This concept is expanded by using computers as communication centers in a dial-up connection. These computers are called bulletin boards. Users connect to this messaging platform, leaving or removing messages, as well as uploading and downloading files. The limitation of the system is that there are very few directions of communication, and only to those who know about that notification platform. In addition, the computers on the notice floor need a modem for each connection. As the number of connections increases, the system cannot meet the demand. Through the 1950s, 1970s, 1980s, and 1990s, the US Department of Defense developed highly reliable WAN-wide area networks to serve
  • 3. military and scientific purposes. This technology is different from point-to-point communication. It allows multiple computers to connect using different paths. The network itself determines how data moves from one computer to another. Instead of being able to communicate with only one computer at a time, it can communicate with multiple computers at the same time using the same connection. Later, the US Department of Defense's WAN became the Internet. I have Chat GPT Blueprint Digital Ebooks available click on this link. Network computational model Centralized computing model All processing takes place at the central computer. Terminals are networked to the central computer and only act as data input and output devices allowing users to view on the screen and enter data via the keyboard. Terminal workstations do not store and process data. The above network computing model can be deployed on a hardware system or software installed on the server. Advantages: Data is safe, easy to back up, easy to remove viruses, and low installation costs. Disadvantages: Difficult to meet the requirements of many different applications, slow access speed. Distributed computing model Computers can operate independently, and tasks are broken down and assigned to many different computers in the network instead of concentrating on processing on a central computer. Although data is processed and stored locally, these computers are networked together to exchange data and services. Advantages: Fast access, mostly unlimited applications. Disadvantages: Fragmented data storage is difficult to synchronize, and back up and is very susceptible to viruses.
  • 4. Collaborative computing model The collaborative network computing model involves multiple computers that can cooperate to perform a job. One computer can borrow the computing and processing capacity of another computer by running programs on computers on the network. Advantages: Very fast and powerful processing, can be used to run applications with large mathematical operations and large data processing. For example: cracking code systems, calculating DNA,... Disadvantages: Data is stored in different locations so it is difficult to synchronize and back up, and the possibility of virus infection is very high. I have Full-Stack Web Development In 7 days Ebook Digital Ebooks available click on this link. Network classification LAN LAN ( English: Local Area Network ), also known as "local area network", is a private network in a building, an area (school or office, for example) about a few kilometers in size. [5] They connect servers and workstations in offices and factories to share resources and exchange information. LAN has 3 characteristics: The limited range of operation ranges from a few meters to 1 km. They are often using a simple technique with only one cable connecting all machines. Typical data transfer speeds are 10 Mbps, 100 Mbps, 1 Gbps, and more recently 100 Gbps. [6] Three common LAN-type network architectures include: Bus network or linear network. The machines are connected continuously in a row from one machine to the other. An example is Ethernet ( IEEE 802.3 standard ). Ring network. The machines are connected as above and the last machine is connected back to the first machine to form a closed loop. For example, the IBM token ring network ( IBM token ring ). Star network. MAN
  • 5. MAN ( English: Metropolitan Area Network ), also known as "metropolitan network", is a network larger than LAN, with a range of several kilometers. It can consist of groups of offices close together in a city, it can be public or private and has the following characteristics. I have the Godot Game Development Machine Learning Masterclass Digital membership area available click on this link There are only a maximum of two connecting cables. Do not use transfer techniques. Can support general data transport and voice, or even television. Today people can use fiber optic technology to transmit signals. Current speeds can reach 10 Gbps. An example of this technique is a DQDB ( Distributed Queue Dual Bus ) network, also known as a distributed dual bus (IEEE 802.6 standard).
  • 6. WAN Types of connections in WAN WAN ( English: Wide Area Network ) is also known as a "wide area network", used in large geographical areas, usually for countries or entire continents, with a range of several hundred to several thousand kilometers. They consist of collections of machines intended to run programs for users. These machines are often called storage machines ( hosts ) or also called servers or end systems. The main machines are connected by communication subnets, or more simply, subnets. The task of the subnet is to transmit messages from one server to another. I have The Complete Python, Machine Learning, AI Mega Bundle+ Digital membership area available click on this link. Subnets usually have two main components: Transport lines are also called circuits, channels, or trunks. Connecting devices. This is a specialized type of computer used to connect two or more trunk lines to move data between computers. When data arrives on the input lines, the switching device must select (according to a predetermined algorithm) an output line to send that data. The name of this device is a packet-switching node or intermediate system. The computer used for the connection is called a "path selector" or "router". Most WANs consist of multiple cables or phone lines, each connected to a pair of routers. If two routers are not connected to the same line, they will communicate indirectly through many other intermediate routers. When the router receives a data packet, it holds the packet until the outgoing line needed for that packet is free, then it forwards the packet. This case is called the point-to-point subnetwork principle, or the store-and-forward subnetwork principle, or the packet-switching subnetwork principle. There are many types of WAN configurations using the point-to-point principle such as star, ring, tree, complete, ring, or irregular. Network model
  • 7. Main article: Network topology Star Network There are all stations connected to a central device that is responsible for receiving signals from the stations and transferring them to the destination station. Depending on the communication requirements of the network, the central device can be a hub, switch, router, or central server. The role of the central device is to establish Point-to-Point links. I have The Complete Excel, AI, and Data Science Mega Bundle Digital membership area available click on this link. The advantages are simple network setup, easy network reconfiguration (add or remove stations), easy control and troubleshooting, and full advantage of the transmission speed of the physical connection. The disadvantage is that the transmission line length connecting a station to the central device is limited (a radius of about 100m with current technology). Bus Network Have all stations divided on a common line (bus). The main transmission line is limited at both ends by two special connectors called terminators. Each station is connected to the main axis via a T-connector or a transceiver. The Bus network model operates on point–to–m–multipoint or Broadcast links. Advantages: Easy to design and low cost. Disadvantages: Poor stability, just one network node fails and the entire network stops working. Ring Network The signal is transmitted on the ring in only one direction. Each station of the network is connected through a repeater, which is responsible for receiving the signal and then forwarding it to the next station on the ring. Thus the signal is circulated on the ring in a consecutive series of Point-to-Point links between repeaters. Advantages: Ring networks have the same advantages as star networks.
  • 8. Disadvantages: One broken station or cable means the entire network stops working, adding or removing a station is more difficult, and the network access protocol is complicated. Mesh Network Star and linear combination (Star Bus Network): This type of network configuration has a signal splitter (splitter) acting as a central device, and the network cabling system is configured as Star Topology and Linear Bus Topology. The advantage of this configuration is that the network can consist of many groups working far away from each other. ARCNET is a combined Star Bus Network. This configuration offers flexibility in wire layout to easily adapt to any building.I have The Complete AI Digital Artist Masterclass Digital membership area available click on this link. Star and ring combination (Star Ring Network): Configure the Star Ring Network combination, there is a communication "card" (Token) that is transferred around a central HUB. Each workstation is connected to a HUB - a bridge between workstations to increase the necessary distance. Ring network Linear network Communication methods Circuit Switching Network Main article: Channel switching
  • 9. When two stations need to exchange information with each other, a fixed "channel" will be established between them and maintained until one of the two parties disconnects. Data is only transmitted along this fixed path. Circuit switching techniques are used in ATM (Asynchronous Transfer Mode) and Dial-up ISDN (Integrated Services Digital Networks) connections. An example of a circuit-switched network is the telephone network. The advantage is that the transmission channel is reserved during the communication process, so data transmission speed is guaranteed. This is especially important for real-time applications such as audio and video.I have Kids Coding: Unlock the World of Programming Digital membership area available click on this link. The disadvantage is that it takes time to establish a fixed connection between two stations; The transmission efficiency is not high, because there are times when there is no data transmission on the channel from the two connected stations, but other stations are not allowed to use this channel. Message Switching Network Unlike circuit switching, message switching does not establish a dedicated link between two communicating stations, instead, each message is treated as an independent block containing both a source and destination address. Each message will be transmitted through stations in the network until it reaches the destination address, each intermediate station will receive and store the message until the next intermediate station is ready to receive the message then it forwards. relays the message to the next station; for this reason, a message-switching network can also be called a Store and Forward Network. A typical example of this technique is electronic mail (e-mail), which is relayed through stations until it reaches its destination. The advantage is to provide a more efficient management of network traffic, by assigning priorities to messages and ensuring that higher priority messages are circulated instead of delayed due to traffic on the network; Reduces network congestion, and intermediate stations can store messages until the channel is free before sending messages; Increase the efficiency of using the channel. With this technique, stations can share the same channel.
  • 10. The disadvantage is that the delay caused by storing and forwarding messages is not suitable for real-time applications. Intermediate stations must have a very large memory capacity to store messages before forwarding them to another intermediate station (the size of messages is not limited). Packet Switching Network Main article: Packet switching This technique is proposed to take advantage of the advantages and overcome the disadvantages of the above two techniques. For this technique, messages are divided into packets of variable size, each packet includes data, source address, destination address, and information about intermediate station addresses. Individual packets do not always follow a single path; this is called independent routing. I have Complete Unity/Unreal/Godot ChatGPT, AI, Development Bundle |Digital membership area available click on this link. The advantage is that bandwidth can be managed by splitting data into different paths in case the channel is busy; If a link fails during communication, the remaining packets can be sent via other paths; The basic difference between message switching and packet switching is that in packet switching, packets are limited in maximum length, allowing switching stations to store packets. information into internal memory without having to send it to external memory, thereby reducing access time and increasing information transmission efficiency. The disadvantage is that the difficulty of the packet switching method that needs to be resolved is to gather packets at the receiver to recreate the original message as well as handle packet loss. Network application model Peer–to–Peer-to-peer network model Main article: Peer-to-peer network Peer–to–peer networks are a very simple example of LANs. They allow every network node to act as both an entity requesting network services (client) and as an entity providing network services (server). In this environment, users on each computer are responsible for operating and
  • 11. sharing their computer's resources. This model is only suitable for small organizations and does not care about security issues. Peer-to-peer network software is designed so that peer entities perform the same functions. The characteristics of a peer-to-peer network are that a peer-to-peer network is also known as a workgroup network and is used for networks with ≤ 10 users working on that network. ; does not require a network administrator; In a peer-to-peer network, each user acts as an administrator for their workstation and chooses which resources or data they will allow being shared on the network as well as who can access them. those resources and data.I have a Hello Coding Anyone Can Learn to Code Digital membership area available click on this link. The advantage is the simplicity of installation and relatively cheap cost. The disadvantage is that there is no centralized administration, especially in cases where there are multiple accounts for one user to access different workstations; Network security can be violated with users share the same username and password to access the same resource and cannot centrally backup (backup) data. Data is stored scattered on each station. Client–Server Network / Server-Based Network model Main article: Client-server Client-host networking involves defining the roles of communication entities within the network. This network determines which entities can make service requests and which entities can service those requests. Machines are organized into domains. Security on domains is managed by several special servers called domain controllers. On the domain, there is a master domain controller called PDC (Primary Domain Controller) and a BDC (Backup Domain Controller) to prevent PDC problems. Network management model Workgroup network model
  • 12. The Workgroup network model is a group of network computers that share resources such as data files and printers. It is a logical group of computers that all have the same group name. There can be many different workgroups connected on a local area network (LAN). The Workgroup network model is also considered a peer-to-peer network because all machines in the workgroup have equal rights to share resources without needing to be specified by the Server. Each computer in the group maintains and secures its local database. This means that all administration of user accounts and security of shared resources are not centralized. You can connect to an existing group or create a new group. I have Google Bard AI Expertise Digital Ebooks available click on this link. The advantage is that Workgroups do not require a computer running on the Windows Server operating system to centralize security information; Workgroups are simple to design and implement and do not require the extensive planning and administration that a domain requires; Workgroups are convenient for groups with a small number of computers that are close together (≤ 10 computers). The downside is that each user must have a user account on each computer they want to log in to; Any user account changes, such as changing a password or adding a new user account, must be made on all computers in the Workgroup, if you forget to add a new user account to a computer. within the group, new users will not be able to log in to that computer and will not be able to access that computer's resources; Device and file sharing is handled by individual computers, and can only be used by users with accounts on that computer. Domain network model Main article: Domain name A domain network model is a group of network computers sharing a centralized directory database. The data directory contains user accounts and security information for the entire Domain. This data directory is known as the active directory.
  • 13. In a Domain, directories only exist on computers configured as domain controllers. A domain controller is a Server that manages all security aspects of the Domain. Unlike Workgroup networks, security and administration in the domain are centralized. To have a Domain controller, servers must run a Domain controller service (a service built into Microsoft's Windows Server versions; or on Linux, we configure the Samba service to perform the Domain controller task). ,...). A domain is not considered a single location or separate network configuration. Computers in the same domain can be on a LAN or WAN. They can communicate with each other via any physical connection, such as Dial-up, Integrated Services Digital Network (ISDN), Ethernet, Token Ring, Frame Relay, Satellite, and Fiber Channel.I have Extraordinary Parenting Digital Ebooks available click on this link. The advantage is that it allows centralized administration. If a user changes their password, the change is automatically updated across the Domain; Domains provide a simple login process for users to access the network resources they are authorized to access; Domain provides flexibility so administrators can create very large networks. Typical domains in Windows Server may contain the following computer models: Domain controllers store and maintain directory replicas. In a domain, a user account is created once, Windows Server records it in this directory. When a user logs in to a computer in the domain, the domain controller checks the directory for the user name, password, and login restrictions. When there are multiple domain controllers, they periodically regenerate their directory information. Member servers: A member server is a server that is not configured as a domain controller. The server does not store directory information and cannot verify the user's domain. Servers can provide shared resources such as shared folders or printers. Client computers: Client computers run an operating system for the user's workstation and allow users to access resources in the domain. Unlike Workgroup, Domain must exist before users join it. Joining a Domain always requires the Domain administrator to provide an account for the user's computer to that domain. However, if the
  • 14. administrator gives the user the correct privileges, the user can create his or her computer account during the installation process. Network parameters Bandwidth (Bandwidth - B) In computer technology, bandwidth is a quantity used to refer to the amount of data that can be transmitted in a certain time. For digital devices, bandwidth is calculated in bps (bits per second) or Bps (bytes per second). Latency (Latency - L) Latency is the time it takes to transfer a message from one node to another in the network. Throughput – T Throughput is the amount of data passing through a link in a unit of time. Or throughput is the actual bandwidth used by network applications during a specific time (throughput can be time-varying). I have COACHY Your member area with landing page builder Digital membership area available click on this link. Throughput is usually much smaller than the maximum possible bandwidth of the transmission medium used (Throughput ≤ Bandwidth). The throughput of a computer network depends on factors such as link distance, transmission environment, network technologies, type of data transmitted, number of users on the network, user computers, servers, etc. Data communication methods Main article: Network node Unicast method: A source node wants to send a message to only one destination node on the network. Multicast method: A source node wants to send a message to a group of destination nodes on the network. Broadcast method: A source node wants to send a message to all other destination nodes on the network. Network protocols
  • 15. I have the Affiliarena Digital membership area available click on this link. Main article: Communication protocol Main article: TCP/IP Typical network models The following models, TCP/IP and OSI, are standards, not filters or protocol generators. OSI OSI model with seven layers. OSI, also known as the "Open Systems Interconnection Reference Model", abbreviated as OSI Model or OSI Reference Model is a design based on the development of ISO (International Organization for Standardization) and IUT-T. The model includes 7 floors: Application layer (Layer 7): allows users (human or software) to access the network by providing a user interface, supporting services such as remote access email and file transfer, shared database management, and several other information services.
  • 16. Presentation layer (Layer 6): performs tasks related to the syntax and content of sent information. Session layer (Layer 5): plays the role of " dialog " controller of the network with the task of establishing, maintaining, and synchronizing the interaction between the two parties. Transport layer (Layer 4): receives data from the session layer, cuts them into small units if necessary, sends them to the network layer, and checks that these units reach the receiving end. Network layer (Layer 3): controls the operation of the subnet. Determines the beginning and end of a data transfer. Data link layer (Layer 2): the main task is to convert data into data frames according to algorithms to detect, adjust, and solve problems such as damage and loss. and duplicate data frames. Physical layer (Layer 1): Performs the functions necessary to transmit data streams in the form of bits across physical media. TCP/IP TCP / IP is like OSI but this one has three fewer layers: The application layer: includes many high-level protocols. Previously, people used virtual terminal applications such as TELNET, FTP, and SMTP. Later, many additional protocols were defined such as DNS, and HTTP. I have ChatGPT Command Bible Digital - Ebooks available click on this link. Transport layer: the task is the same as the transport part of OSI but there are two protocols used: TCP and UDP. Network layer: responsible for transferring data packets from sender to receiver. Data packets may have to go through many networks (intermediate hops). The data link layer transfers data packets between two devices on the same network, while the network layer ensures that the data packet will be transferred from the sender to the correct recipient. This layer defines a packet format and protocol called IP. Data link layer: Used to transmit data packets across a physical medium. Network devices Main article: Terminal system
  • 17. Transmission equipment Twisted pair cable: Twisted pair cable consists of many pairs of copper wires twisted together to prevent electromagnetic interference emission. Due to its low price, twisted-pair cables are widely used. There are two types of twisted pair cables widely used in LAN: shielded and unshielded. Coaxial Cable Fiber optic cable: a type of telecommunications cable made of glass or plastic, using light to transmit signals. The fiber optic cable is long, thin, and composed of transparent glass about the diameter of a human hair. They are arranged in bundles called fiber optic cables and are used to transmit signals over very long distances. Unlike copper cables that transmit signals electrically, fiber optic cables are less susceptible to interference, have higher speeds, and transmit farther.I have an Online Business mit Google Bard Digital membership area available click on this link. Connected devices Wireless Access Point is a wireless network connection device designed according to IEEE 802.11b standards, allowing LAN to LAN connection, using CSMA/CA mechanism to resolve disputes, using both Infrastructure and Network connection architectures. AdHoc, 64/128 bit encryption. It also supports wireless transmission speeds of up to 11Mbps on the 2.4 GHz band and uses DSSS (Direct Sequence Spectrum Spreading) radio technology. Wireless Ethernet Bridge is a device that allows Ethernet devices to connect to a wireless network. For example, the Linksys WET54G Wireless-G Ethernet Bridge device. It supports any Ethernet device connecting to a wireless network whether that Ethernet device can be a single device or a router connected to many other devices. A network card is a type of expansion card attached to a computer, providing physical and logical communication between the computer and network devices and network systems through transmission media. A repeater is simply a signal amplifier between two ports of two network segments. Repeaters are used in the Bus network model to extend the maximum distance on a cable line. There are two types of Repeaters in use: Electric Repeaters and Optical Repeaters. Used to connect two networks with the same communication protocol Hub is a device with the same function as a Repeater but with more communication ports allowing many network devices to connect at one
  • 18. point. Hubs typically have from 4 to 24 communication ports, often used in 10BaseT Ethernet networks. Hub is just a multi-port Repeater. The hub repeats any signal received from any one port and sends that signal to all remaining ports on it. Hubs operate at the physical layer of the OSI model and also do not filter data. Hubs are often used for networking, through their plugs people connect to computers in star form. Hubs are divided into two main types: Passive hubs and Active hubs.I haveSucceX Business Success on the microblogging platform X Digital membership area is available click on this link. A bridge is a device that allows connecting two network branches, with the function of selectively transferring packets to the network branch containing the packet recipient. To filter packets and know which packet belongs to which network branch, the Bridge must contain a MAC address table. This address table can be created automatically or must be configured manually. Because the Bridge understands the MAC address, the Bridge operates at the second layer (data link layer) in the OSI model. A modem is a device used to convert digital format data into analog format data for a transmission process from a digital signal medium through an analog signal medium and then back to a digital signal medium at the receiving end. Final. The name Modem is an acronym composed of the first letters of MOdulator/DEModulator - Modulator/Demodulator. A switch is a harmonious technical combination between a Bridge and a Hub. The operating mechanism of a Switch is very similar to a Hub because it is a device that centralizes network connections on it. The communication ports on the Switch are miniature bridges built on each corresponding communication port. A router is a router used to connect multiple network segments, or multiple network types (usually heterogeneous in architecture and technology) into the same interactive network. Typically there is a processor, memory, and two or more input/output ports. Brouter Gateway is an intermediary device used to connect different networks in both architecture and network environment. A gateway is understood as the main entrance port of an internal network connecting to another external network. It may be a specialized hardware device, but it is
  • 19. usually a server that provides connections for the machines it manages to communicate with another network. Network technologies Point-To-Point Main article: Point-To-Point Ethernet Main article: Ethernet Token Ring Main article: Token Ring FDDI Main article: FDDI In essence, FDDI is like Token Ring, but double Token Ring. That means FDDI has 2 Token Rings, but, only 1 ring is active, and 1 ring is used as a backup in case the other ring goes down.I have Insta AI Copy Paste Business | Digital - membership area available click on this link. FDDI ensures LAN operates effectively, without downtime, and provides higher security. Subscriber network Main article: Subscriber network Switched network Main article: Switched network ATM ATM(Asynchronous Transfer Mode) is a packet switching technology compatible with all types of services today. It is used in both the access network and the core network. Operates at layer 2 datalink of OSI -The data to be sent is divided into packets with a fixed length of 53 bytes, called a cell. X.25 X.25 is a protocol recognized by CCITT ( English acronym: Consultative Committee for International Telegraph and Telephone). This protocol is a very popular protocol introduced to ensure the integrity of data when traveling in the network. It defines the interconnection of multiple networks using packet-switching techniques with associated computers or outputs. X.25 allows computers on many different public networks to
  • 20. communicate through an intermediate computer at the network layer.I have Affiliate-Marketing A-Z der Gurus Digital Ebooks available click on this link. Frame relay Frame relay is a packet-switching protocol used to connect devices in a WAN. This protocol was created for use in very fast environments with little chance of error. In the US, it supports T-1 (or DS1) speeds up to 1,544 Mbps. Frame relay is essentially based on the old X.25 protocol. The difference is that frame relay is a "fast-packet" technique and this technique will not perform error correction. When an error is found, it simply drops the packet with the error. The terminals are responsible for detecting errors and requesting resends of aborted packets. DSL Main article: DSL Main article: ADSL Main article: HDSL Main article: RADSL Main article: VDSL Novell Netware Main article: Novell Netware Windows NT Main article: Windows NT Apple Talk Main article: Apple Talk ARPANET ARPANET is a WAN-style network, nse ) initiated in the early 1960s to create a network that could survive a possible nuclear war between the United States and the Soviet Union. The word ARPANET is a combination of the words Advance Research Project Agency and the word NET. This was one of the first networks to use packet-switching technology, it consisted of subnets and multiple masters. Subnets are designed using minicomputers called IMPs, or Interface Message Processors, (from the word Interface Message Processor ) to ensure communication capabilities, each IMP must connect to at least two other IMPs and call the software of these subnets the IMP-IMP protocol. The IMPs are connected by existing 56 Kbps telephone lines.
  • 21. ARPANET has developed very strongly thanks to the support of universities. Many other protocols have been tested and applied on this network, the most important of which is the invention of the TCP/IP protocol used in LANs connected to ARPANET. By 1983, ARPANET had proven resilient and successful, including more than 200 IMPs and hundreds of mainframes. Also in the 1980s, many LANs were connected to ARPANET, and the design of DNS, or domain naming system, (from the word Domain Naming System ) was also born on this network first. By 1990, this network was no longer in use. This is considered a historic network and the predecessor of the Internet. NFSNET In 1984, the National Science Foundation of the United States (NSF) was designed to serve the research and information needs between universities, including 6 supercomputers from many centers spread throughout the United States. This was the first WAN to use TCP/IP. In the late 1990s, fiber optics technology was applied. In December 1991, the National Research and Educational Network was born to replace NSFNET and used speeds up to gigabits. By 1995, NSFNET was no longer needed. Internet The number of computers connected to the ARPANET increased rapidly after TCP/IP became the sole official interface on January 1, 1983. After ARPANET and NSFNET were connected, network development increased exponentially. Many parts of the world began connecting to form networks in Canada, Europe, and across the Atlantic Ocean, forming the Internet. Since 1990, the Internet has had more than 300 networks and 2,000 computers connected. By 1995 there were hundreds of medium-sized networks, tens of thousands of LANs, millions of mainframes, and tens of millions of Internet users. Its size doubles every two years. I have the Das Home Office Cash Paket Digital membership area available click on this link. The main fabric that holds the Internet together is the TCP/IP protocol and the TCP/IP interface stack. TCP/IP made services ubiquitous. By January 1992, the spontaneous development of the Internet was no
  • 22. longer effective. The Internet Society was born to promote and manage it. The Internet has the following main applications: Electronic mail ( email ): provides the ability to write, send and receive emails. Newsgroup: forums for users to exchange information. There are tens of thousands of such groups and each has its style and style. Remote login: helps users anywhere can use the Internet to log in and use or control another computer where they have an account. Famous is the Telnet program. File transfer: use the FTP program to transfer files over the Internet everywhere. Search engines, these programs over the Internet, can help people find information in all forms and levels about anything. From finding in-depth research documents to finding people and information about that person, or finding directions on maps, Wireless network Black laptop with the router in the background Computers are very often connected to networks using wireless links Main article: Wireless network Handheld or pocket-sized devices can often communicate with each other wirelessly and in a LAN fashion. Another option used for cell phones is based on the CDPD ( Cellular Digital Packet Data ) protocol or digital cellular packet data. Wireless devices can completely connect to a regular (wired) network to form a mixed network (equipped on some passenger aircraft. I have AI Cash Klub Earn money with artificial intelligence Digital membership area available click on this link. Internet Main article: Internet connection Networks around the world may differ in hardware and software, so for them to communicate with each other, a device called a gateway is required to coordinate the task. A set of interconnected networks is called an internetwork. The most common form of internetworking is a
  • 23. collection of multiple LANs connected by a WAN. I have Avatar Speak Pro Lifelike KIAvatars for more conversion Digital software available click on this link. Main article: Internet connection Networks around the world may differ in hardware and software, so for them to communicate with each other, a device called a gateway is required to coordinate the task. A set of interconnected networks is called an internetwork. The most common form of internetworking is a collection of multiple LANs connected by a WAN. ISDN Main article: PSTN Main article: ISDN ISDN comes from the word Integrated Services Digital Network, meaning "digital network of integrated services". In general, ISDN is a type of network that uses circuit-switched connection technology. ISDN is an international standard for digital audio, data, signal, and video communications. For example, it can be used for video conferences to simultaneously exchange images, sounds, and text between personal computers connected to a group of video conferencing systems. The ISDN system uses connections over digital telephone lines to allow multiple channels to operate simultaneously over a single interface standard. Users at home and in economic establishments who want to have ISDN via a digital telephone line system need to install special
  • 24. hardware equipment called adapters. ISDN's current maximum speed is up to 128 Kbps. Many localities that are not equipped with digital telephone lines will not be able to install ISDN technology. Organizations influencing network standardization Organizations with major influence or authority on computer network standardization: ISO "International Organization for Standardization" ANSI "American National Standards Institute" IEEE "Institute of Electrical and Electronics Engineers" ITU "International Telecommunication Union" I have Internet Money Secrets Digital other download products available click on this link. Social issues Relationships between people becoming faster, easier, and closer also bring many social problems that need to be solved such as: Abusing the network system to do illegal or unethical things: Organizations of human trafficking, pornography, fraud, or cybercrime, hacking organizations to steal property of citizens and agencies, terrorist organizations. The larger the network, the easier the risk of spreading malicious software (malware). The trading system becomes more difficult to control but also creates conditions for fiercer competition. One problem that arises is defining the border between the control of public employees and their private property rights. (The owner wants full control over emails or online chats, but this can seriously violate personal rights.) The problem of educating teenagers also becomes more difficult because they can participate in activities online that are difficult for parents to control. More than ever with fast communication media, freedom of speech or abuse of speech rights can also have a more profound impact than before as is the case with advertising software ( adware ) and spam emails. junk ( spam mail ).
  • 25. The development of computer network systems brings many benefits to society such as. I have ChatGPT The AI all-rounder for your everyday life Digital Ebooks are available click on this link. Many people can share the same utility software. If a group of people working on a project are connected to the network, they will share the project's data, share the project's master file, and exchange information with each other easily. Data is centrally managed so it is secure, exchange between users is convenient and fast, and data backup is better. Shared use of printers, scanners, hard disks, and other devices. Users exchange information easily with each other through electronic mail service (Email), Chat services, file transfer services (FTP), and Web services. Eliminate barriers of geographical distance between computers in the network that want to share and exchange data with each other. Some users do not need to be equipped with expensive computers (low cost but strong functions). Allows programmers in one computer center to use utility programs and memory areas of another computer center that are idle to increase the economic efficiency of the system. Safe for data and software because it manages access rights of user accounts (depending on network administrators). References ^ Computer network definition ^ John Kopplin (2002). “An Illustrated History of Computers: Part 4” . ComputerScienceLab. ^ “DEC released its first mini computer: PDP-1” . ^ Tom Owad (May 22, 2004). “October 1977 Price List” . ^ New global standard for fully networked home, ITU-T, 12 December 2008, Archived from the original on 21 February 2009, retrieved 12 November 2011 ^ IEEE P802.3ba 40Gb/s and 100Gb/s Ethernet Task Force, accessed November 12, 2011, Read more Cisco Professional Certificate Microsoft Professional Certificate
  • 26. Banking network system Join-transfer technique I have Affiliate School Masterclass Partnerprogramm Digital membership area available click on this link. Further research Tanenbaum, Andrew S. Computer Networks. 3rd ed. Prentice Hall PTR. ISBN 0-13-066102-3. Shelly, Gary, et al. "Discovering Computers" 2003 Edition Cisco Systems, Inc., (2003, March 14). CCNA: network media types. Accessed from ciscopress.com Wendell Odom, Rus Healy, Denise Donohue. (2010) CCIE Routing and Switching. Indianapolis, IN: Cisco Press Kurose James F and Keith W. Ross: Computer Networking: A Top-Down Approach Featuring the Internet, Pearson Education 2005. Andrew S. Tanenbaum, Computer Networks, Fourth Edition, Pearson Education 2006 ( ISBN 0-13-349945-6 ). William Stallings, Computer Networking with Internet Protocols and Technology, Pearson Education 2004. Important publications in computer networks Vinton G. Cerf "Software: Global Infrastructure for the 21st Century" Meyers, Mike, "Mike Meyers' Certification Passport: Network+" ISBN 0-07-225348-7 " Odom, Wendall, "CCNA Certification Guide" Network Communication Architecture and Protocols: OSI Network Architecture 7 Layers Model External links Wikimedia Commons has media related to Computer networks. Easy Network Concepts (Linux kernel specific) Computer Networks and Protocols (Research document, 2006) Computer Networking Glossary Archived 2006-08-16 at the Wayback Machine Networking on DMOZ