2. What is Networking?
Definition: A network connects two or
more computers so that they can
share information, applications or
resources.
3. Networking
Networks are simply a collection of
resources connected by cable or other
media so they can share information
Networks made sharing data much easier
and more efficient for users.
4. Network: To connect two or more
computers together with the ability
to communicate with each other
5. Examples of Shared Resources
Printers
Fax devices
Files and Folders (Data)
Modems
7. Hardware tools / Network Components
used in connecting system’s for a
Network
NIC (Network Interface Card) or Ethernet
HUB (Repeater)
SWITCH
Transmission Medium – Cables / Wires,
Connectors.
ROUTER
BRIDGE
MODEM
GATEWAY
WIRELESS CARD
8. Network Components
Server : Powerful machine with a robust
performance and power (e.g. Windows NT, 2000
Server, 2003 Server, Longhorn, Enterprise Linux)
Client: Uses the server’s services – any machine
running a client software (e.g. Windows 3.11, 95,
98, ME, 2000, XP, Vista, 7, 8 etc ……)
Peer: Acts as both Client and Server
9. Network Components
Media: Bounded (UTP, STP or Coax.) or
unbounded( Satellite, Microwave or wireless)
Resources: anything that client uses
User: any person using the resources
Protocols: the rules of communication (TCP/IP,
IPX/SPX,…..)
11. Networking
All systems on the link must follow a set of
common communication rules called
protocols.
12. Networking Models
Peer-to-Peer
Server-Based
It is important to remember that one
type of networking configuration is
not necessarily better than another.
13. Peer-to-Peer
There are no dedicated servers
All the computers are equals and therefore are
known as peer.
Each computer functions as both client and server,
No administrator
Each user determine what data to share
15. Features of peer-to-peer network
=<Size
=<Cost
=<Operating Systems
=<Implementation
=<Administration
=<Sharing resources
=<Server requirements
=<Security
16. Peer-To-Peer
Size
Peer-to-peer is called “workgroup”
Workgroup: small group of computers
In peer-to-peer there are 10 or less computers.
17. Peer-To-Peer
Cost:
Is simple
Each computer functions as client and server, so
there is no need to central server
Less expensive than server-based networks.
19. Peer-to-Peer
Implementation
Peer-to-Peer implementation offers the following
advantages:
Computers are located at users’ desks.
Users act as their own administrators and plan their
own security.
Computers in the network are connected by a
simple, easily visible cabling system.
20. Peer-to-Peer
Where a Peer-to-Peer is appropriate
There are 10 users or fewer.
Users share resources, such as files and printers,
but no specialized servers exist.
Security is not an issue
The organization and the network will experience
only limited growth within the foreseeable future.
21. Peer-to-Peer
Administration
Network administration tasks include:
Managing users and security
Making resources available
Maintaining applications and data
Installing and upgrading application & operating
system software.
22. Peer-to-Peer
Sharing resources
All users can share any of their resources in any manner
they choose.
Resources include: data, printers, fax cards, and so on.
Server requirements
In a peer-to-peer, each computer must:
Use a large percentage of its resources to support the
users (local user).
Use additional resources such as hard-disk space and
memory to support user’s accessing resource on the
network (remote user)
23. Peer-to-Peer
Security: making computers and data safe from harm
and unauthorized access.
Security consists of setting a password on a resources
such as a folder that is shared on the network.
All users set their own security
Shared resources can exist on any computer rather than
on a centralized server only.
Consequently, centralized control is difficult to maintain.
Low security because some users may not implement
any security measures at all.
24. Peer-to-Peer
Training
Users need training before they are able to function
properly as both users & administrators of their
computers.
26. Server-Based Networks
In a environment with more than 10 users, a peer-to-peer will
properly not be adequate.
Therefore, most networks have dedicated servers.
Dedicated server: is one that functions only as server and is
not used as client or workstation
Server: A powerful computer sometimes with a huge
processing power
There are different types (e.g. file, print server, application,
mail, proxy, DHCP and DNS servers)
The heart of the network, if it goes down, network will loose a
lot!
28. Specialized Servers
As network increase in size, more than one server is
usually needed.
File & Print Servers
Manage user access and use of file and printers
resources.
29. Specialized Servers.
Application servers
Server store vast amount of data that is organized to
make it easy to retrieve.
Application server differ from file and print server.
With file & print server: the data or file is downloaded
to the computer making the request.
30. Specialized Servers
Mail Servers
Operate like application servers in that there
are separate server and client applications,
with data selectively downloaded from the
server to the client. (E.g. MS Exchange)
31. Specialized Servers
Fax server
Manage fax traffic into and out of the network by
sharing one or more fax modem boards.
Communications servers
Handle data flow and email messages between the
servers’ own networks and other networks, or
remote users.
32. Specialized Servers
Directory service Servers
Enable users to locate, store, and secure
information on the network.
For example: some server software combines
computers into logical grouping called domains.
33. Server-Based Network
Most of the mentioned functionality can be
found on one platform (e.g. Windows 2000 /
2003 Server has the following:
DHCP and DNS servers
Proxy server (IIS 5.0)
File Server
Printer Server
For mail server, you should get MS
Exchange
34. The Role of software in Server-
based Networks
A network server and its operating system work
together as a unit.
No matter how powerful or advanced a server might be,
it is useless without an operating system
Operating system takes advantages of its physical
resources
Examples of server operating system: Microsoft and
Novell.
35. Server-Based (Advantages(
Centralized security policies can be imposed
East to back-up data
Centralized administration (Network
Administrator(
Better Performance
More secure
Synchronized Files
37. Dr. Kamal Gulati
Associate Professor |
University Quality Support Head |
Mentoring Programme Coordinator
]Ph. D., M.Sc. (Computer Science), M.C.A., M.B.A[
Professional Certifications:
Certified Microsoft Innovative Educator
Data Science 101 Certification from Big Data University
R Language 101 Certification from Big Data University
SQL Certification from SOLOLEARN.com
Certified IBM Big Data 101 from Big Data University
R Program & Python Certified from DataCamp
Wiley Certified Big Data Analyst ]WCBDA[
Certification on DBMS from IIT Mumbai
Certified Cisco Certified Network Associate ]CCNA[
Certified Microsoft Certified Professional ]MCP[
Certified Brainbench in Computer Fundamentals, Microsoft Access, MySQL 5.7 Administration &
Microsoft Project
38. •Worked as Visiting Professor with Stratford University, USA for six months
from Jan’2016 to June’2016.
•Also worked at Bahrain University in Kingdom of Bahrain Sr. I.T. Faculty
(Computer Science Department) for Period of 2 Years.
•Have rich experience in the field of teaching and research in Computer
Science and Information Technology for almost 15+ years in Academia.
•Having experience of working with both private and public institutions and
universities as the lecturer and self-instruction material writer for Information
Technology courses.
•Had number of research papers published in national and international journals
and conference proceedings in IEEE and Scopus Index.
•Also chaired various National and International Conferences of repute and
associated with various International Journals as Editorial Board Member for
International and National, Academic Adviser and Research Paper Reviewer.
My current area of interest: Big Data Analytics, R Software, Management
Information System, IT Project Management, Decision Support System,
Business Analytics, Database Management System, Data Networking and
Advanced Excel with Visual Basic Macros.
Country Visited: USA, Canada, UK, UAE, Bahrain, Oman (Mostly for Teaching
and Research Purpose)
Profile of Dr. Kamal Gulati
39. Technical Program Committee for International Conference on Data, Engineering and
Applications 2017 (IDEA-2k17) which would be on October 28-29, 2017 at Bhopal.
http://www.ideaconference.in
Advisory Board Committee Member for International Conference on Energy, Communication,
Data Analytics and Soft Computing (ICECDS) which would be on 1-2 August 2017 at SKR
Engineering College, Poonamallee, Tamil Nadu, India.http://ecds.org.in
Advisory Committee Member for International Conference on Innovative Research in
Engineering and Science which would be on 16-17 June 2017 at Asian Institute of Technology
Conference Center Thailand.http://www.iresconf.org
Advisory Committee Member for International Conference on Cloud Computing and Internet of
everything which held on 10-11 Feb’2016 at Delhi-NCR.http://www.ccioet.org
Technical Committee member for InCITe-2016 (International Conference on Information
Technology) Theme - Internet of Things: Connect Your Worlds, IT Summit, Amity University
2016 which held on 06-07 Oct, 2016. http://www.amity.edu/incite2016
Technical Speaker for Global perspective on IT business “The Changing Scenario” – Big Data
on International Students Conference New Delhi (ISCND) which held on 14-15 Oct, 2016
http://iscnd.com
Advisory Committee Member for International Conference on Sustainable Computing
Techniques in Engineering, Science and Management which has held on 09-10 Sep’2016 at
Delhi-NCR. http://www.scesm.org
Technical Program Committee Member for Program Committee Member for International
Conference on Recent Trends IN ICT, Jaipur, India, Aug 18-19, 2017 http://rtict.org
Program Committee Member for International Conference on Recent Advancement in Computer
and Communication Bhopal, India, (IC-RAC-2017) May 26-27, 2017 http://www.icrac.co.in
Profile Contd….
40. Editorial Board member for the following International Journals:
International Journal of Computer Science and Innovation
http://www.infinitysciences.org
International Journal of Latest Research in Engineering and
Technology http://www.ijlret.com
International Journal of Latest Trends in Engineering and Technology
http://www.ijltet.org
InternationalJournalofApplicationorInnovationinEngineering
&Management http://www.ijaiem.org
International Journal for Management http://www.ijm-apm.com
ITM International Journal of Innovations in Science, Engineering &
Management www.iijisem.org
The International Journal of Emerging Engineering and Embedded
Systems http://www.ijeees.org
Conference Info http://conferenceinfo.org/tpc.php
International Journal of Computer Engineering in Research Trends
(IJCERT) http://www.ijcert.org
Expert Speaker for Program “Insurance Beyond Doubt” Presented by Oriental Insurance Co Ltd.
Profile Contd….
41. BOOK, CHAPTER, and CASE STUDY Published
Published Book on “A Study of Changing Trends in E-CRM of
Indian Insurance Industry” Published by LAP Lambert Academic
Publishing, one of the top researchers and renowned scientists
of Germany with ISBN: 3330009543, 9783330009547. The Book
available at Amazon.com.
Published Real Case Study on “IoT Security Considerations for
Higher Education” published on Business Cases - RENVOI 2017
BOOK (The Case Centre, UK) with ISBN: 978-1-4828-8840-9,
Page 63-70. The Book available at the various online website:
Amazon, AbeBooks, Chegg, Barnes & Noble.
Published Chapter on "Role of eWorld in Insurance Innovation"
Published by Insurance Institute of India (III), 60 Years Diamond
Jubilee, Compendium, Nov 2016 – (Magazine) – One of the
premium Insurance Institute of India.