0% found this document useful (0 votes)
9 views13 pages

Project Network System

The document presents an overview of computer networks, covering types, topologies, models (OSI and TCP/IP), communication protocols, and security. It highlights advantages and disadvantages of network systems, discusses IP addressing, and explores future applications and trends like cloud computing and 5G. The presentation is coordinated by Mrs. Diaw and features contributions from a team of five members.

Uploaded by

12345687sall
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views13 pages

Project Network System

The document presents an overview of computer networks, covering types, topologies, models (OSI and TCP/IP), communication protocols, and security. It highlights advantages and disadvantages of network systems, discusses IP addressing, and explores future applications and trends like cloud computing and 5G. The presentation is coordinated by Mrs. Diaw and features contributions from a team of five members.

Uploaded by

12345687sall
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 13

PROJECT: NETWORK

SYSTEM
Presented by the team:

• Thierno Ibrahima Bâ

• Faty Mbarou Salane

• Eric Joel Manga

• Bassirou Yate

• Abdoul Khadim Gueuye

Coordinator: Mrs. Diaw


CONTENTS
• Introduction to Computer Networks
• Types of Networks

• Network Topologies

• OSI Model

• TCP/IP Model

• Communication Protocols

• Hybrid Model

• IP Addressing

• Advantages and Disadvantages of Network Systems

• Network Security

• Applications and Future Trends


Introduction to Computer
Networks
A computer network refers to a set of interconnected
devices that enable data exchange. These networks
are essential in our connected world, shaping
communication, commerce, and access to
information.
This presentation will cover different types of
networks, their topologies, the OSI model, as well as
protocols and security. It will also discuss current
applications and future trends in the field of
computer networks.
Network Types

Local Area Networks Wide Area Networks Metropolitan Area Personal Area
(LAN) (WAN) Networks (MAN) Networks (PAN)

Connect nearby Interconnect large Cover a city or urban Small networks for
equipment, such as geographical areas, area, often used to communication
in an office or at such as the Internet, provide Internet between personal
home. They offer linking multiple LANs service to multiple devices via
high speeds and across the world. clients in the technologies like
simple management. metropolis. Bluetooth or NFC.
Network Topologies

Bus Topology Star Topology Ring Topology Mesh Topology


A simple, cost- Centralizes Data moves in a High redundancy with
effective setup connections to a hub closed loop from nodes connected to
connecting all devices or switch. Reliable device to device. multiple others,
via one line. A single since failure of one Manages traffic well ensuring reliability.
cable failure disrupts cable doesn't affect but a single node Requires extensive
the entire network, others, easing failure stops cabling and complex
limiting reliability for maintenance. communication. management, ideal for
large systems. critical networks.
OSI Model
The OSI (Open Systems Interconnection) model defines how hardware and software communicate over a network through seven distinct layers.
Each layer has a specific role in transmitting data, ensuring seamless interoperability between systems.

Physical Layer 1
Transmits raw bits over the medium.

2 Data Link Layer

Manages errors and access control.


Network Layer 3
Routes packets across networks.
4 Transport Layer

Ensures reliable data transfer.


Session Layer 5
Controls sessions between applications.
6 Presentation Layer

Handles data formatting and encryption.


Application Layer 7
Interfaces directly with user software.
TCP/IP Model
Definition Layers of the TCP/IP Model

The TCP/IP model is a standard framework • Network Access: physical communication and data
link.
for communication on the internet.
• Internet: packet routing (IP).
It simplifies data transfer with four main
• Transport: reliable transmission with TCP or fast
layers.
with UDP.

• Application: protocols like HTTP, FTP, SMTP for


network services.
Communication
Protocols

TCP/IP HTTP/HTTPS SMTP/POP3/IMAP FTP


The fundamental Protocols ensuring Protocols dedicated Secure file transfer
protocol ensuring secure and efficient to the management protocol between
reliable web browsing. and transfer of computers over a
communication on emails between network.
the Internet. servers and clients.
Hybrid Model
The hybrid model combines the advantages of the OSI model and the TCP/IP model, thus providing a better
approach for the analysis and understanding of network layers.

It facilitates a practical and consistent representation of the essential functions in network communication.

Physical & Link Layer

Management of hardware transmission and


control of access to the communication
medium. Internet Layer

Ensures packet routing and IP addressing.

Transport Layer

Guarantees the reliability of transmissions and


flow management with TCP and UDP. Application Layer

Provides user services such as HTTP, FTP, and


SMTP.
IP Addressing

IPv4 IPv6 Public Addresses Private Addresses


Address encoded in 32 bits, offering Address encoded in 128 bits, Globally accessible addresses, Reserved for internal networks, they
about 4 billion addresses, but now offering an extremely vast address allowing direct communication on provide better security and isolation
largely saturated. space and integrating advanced the Internet. of communications.
features.

Subnets
Organized subdivision of a network
to optimize data management and
routing.
Advantages and Disadvantages of the
Network System
Advantages Disadvantages
• Optimized sharing of resources among users • Exposure to attacks and intrusion attempts

• Dependence on network infrastructure and

• Simplified communication thanks to permanent equipment

connectivity
• Significant initial investment for installation and

• Centralized data management and enhanced maintenance

security
• Increasing complexity as the network expands

• Flexibility and scalability to meet changing needs


Network Security
Common Threats Security Measures
Viruses, malware, and Firewalls, antivirus
distributed denial-of- software, VPNs, and
service (DDoS) attacks enhanced
compromise the authentication
integrity of networks. mechanisms ensure
the protection of
systems.

User Awareness
User training is essential to prevent human errors
that can compromise security.
Future Applications and
Trends Modern Applications
Cloud computing, the Internet of Things (IoT), and
video streaming are radically transforming
1
network usage.

Future Trends
The rise of 5G, network virtualization, and
2
Software Defined Networking (SDN) are
shaping the future of network
infrastructure.
Conclusion
Networks will continue to evolve,
3
offering increased speed, enhanced
flexibility, and improved security.

You might also like