SlideShare a Scribd company logo
1 of 42
Networking
Dr. Kamal Gulati
What is Networking?
 Definition: A network connects two or
more computers so that they can
share information, applications or
resources.
Networking
 Networks are simply a collection of
resources connected by cable or other
media so they can share information
 Networks made sharing data much easier
and more efficient for users.
Network: To connect two or more
computers together with the ability
to communicate with each other
Examples of Shared Resources
 Printers
 Fax devices
 Files and Folders (Data)
 Modems
Example of Services
 Email
 Database
 Internet Access
Hardware tools / Network Components
used in connecting system’s for a
Network
 NIC (Network Interface Card) or Ethernet
 HUB (Repeater)
 SWITCH
 Transmission Medium – Cables / Wires,
Connectors.
 ROUTER
 BRIDGE
 MODEM
 GATEWAY
 WIRELESS CARD
Network Components
 Server : Powerful machine with a robust
performance and power (e.g. Windows NT, 2000
Server, 2003 Server, Longhorn, Enterprise Linux)
 Client: Uses the server’s services – any machine
running a client software (e.g. Windows 3.11, 95,
98, ME, 2000, XP, Vista, 7, 8 etc ……)
 Peer: Acts as both Client and Server
Network Components
 Media: Bounded (UTP, STP or Coax.) or
unbounded( Satellite, Microwave or wireless)
 Resources: anything that client uses
 User: any person using the resources
 Protocols: the rules of communication (TCP/IP,
IPX/SPX,…..)
Network Components
Server Client Client Client
Client
Resources
Networking
 All systems on the link must follow a set of
common communication rules called
protocols.
Networking Models
 Peer-to-Peer
 Server-Based
It is important to remember that one
type of networking configuration is
not necessarily better than another.
Peer-to-Peer
 There are no dedicated servers
 All the computers are equals and therefore are
known as peer.
 Each computer functions as both client and server,
 No administrator
 Each user determine what data to share
Peer-to-Peer
Features of peer-to-peer network
=<Size
=<Cost
=<Operating Systems
=<Implementation
=<Administration
=<Sharing resources
=<Server requirements
=<Security
Peer-To-Peer
 Size
 Peer-to-peer is called “workgroup”
 Workgroup: small group of computers
 In peer-to-peer there are 10 or less computers.
Peer-To-Peer
 Cost:
 Is simple
 Each computer functions as client and server, so
there is no need to central server
 Less expensive than server-based networks.
Peer-To-Peer
 Operating Systems
 No additional software is required to set up a peer-
to-peer network.
Peer-to-Peer
 Implementation
 Peer-to-Peer implementation offers the following
advantages:
 Computers are located at users’ desks.
 Users act as their own administrators and plan their
own security.
 Computers in the network are connected by a
simple, easily visible cabling system.
Peer-to-Peer
 Where a Peer-to-Peer is appropriate
 There are 10 users or fewer.
 Users share resources, such as files and printers,
but no specialized servers exist.
 Security is not an issue
 The organization and the network will experience
only limited growth within the foreseeable future.
Peer-to-Peer
 Administration
 Network administration tasks include:
 Managing users and security
 Making resources available
 Maintaining applications and data
 Installing and upgrading application & operating
system software.
Peer-to-Peer
 Sharing resources
 All users can share any of their resources in any manner
they choose.
 Resources include: data, printers, fax cards, and so on.
 Server requirements
 In a peer-to-peer, each computer must:
 Use a large percentage of its resources to support the
users (local user).
 Use additional resources such as hard-disk space and
memory to support user’s accessing resource on the
network (remote user)
Peer-to-Peer
 Security: making computers and data safe from harm
and unauthorized access.
 Security consists of setting a password on a resources
such as a folder that is shared on the network.
 All users set their own security
 Shared resources can exist on any computer rather than
on a centralized server only.
 Consequently, centralized control is difficult to maintain.
 Low security because some users may not implement
any security measures at all.
Peer-to-Peer
 Training
 Users need training before they are able to function
properly as both users & administrators of their
computers.
Peer-to-Peer
 Inexpensive
 Easy to set-up
 Used for small offices
 Reasonable number of users is 10
 Easy to maintain
Server-Based Networks
 In a environment with more than 10 users, a peer-to-peer will
properly not be adequate.
 Therefore, most networks have dedicated servers.
 Dedicated server: is one that functions only as server and is
not used as client or workstation
 Server: A powerful computer sometimes with a huge
processing power
 There are different types (e.g. file, print server, application,
mail, proxy, DHCP and DNS servers)
 The heart of the network, if it goes down, network will loose a
lot!
Server-Based Network
Server Client Client Client
Client
Resources
Specialized Servers
 As network increase in size, more than one server is
usually needed.
 File & Print Servers
 Manage user access and use of file and printers
resources.
Specialized Servers.
 Application servers
 Server store vast amount of data that is organized to
make it easy to retrieve.
 Application server differ from file and print server.
 With file & print server: the data or file is downloaded
to the computer making the request.
Specialized Servers
 Mail Servers
 Operate like application servers in that there
are separate server and client applications,
with data selectively downloaded from the
server to the client. (E.g. MS Exchange)
Specialized Servers
 Fax server
 Manage fax traffic into and out of the network by
sharing one or more fax modem boards.
 Communications servers
 Handle data flow and email messages between the
servers’ own networks and other networks, or
remote users.
Specialized Servers
 Directory service Servers
 Enable users to locate, store, and secure
information on the network.
 For example: some server software combines
computers into logical grouping called domains.
Server-Based Network
 Most of the mentioned functionality can be
found on one platform (e.g. Windows 2000 /
2003 Server has the following:
 DHCP and DNS servers
 Proxy server (IIS 5.0)
 File Server
 Printer Server
 For mail server, you should get MS
Exchange
The Role of software in Server-
based Networks
 A network server and its operating system work
together as a unit.
 No matter how powerful or advanced a server might be,
it is useless without an operating system
 Operating system takes advantages of its physical
resources
 Examples of server operating system: Microsoft and
Novell.
Server-Based (Advantages(
Centralized security policies can be imposed
East to back-up data
Centralized administration (Network
Administrator(
Better Performance
More secure
Synchronized Files
Server-Based (Disadvantages(
Dependent on the network administrator
Sometimes expensive server
Dr. Kamal Gulati
Associate Professor |
University Quality Support Head |
Mentoring Programme Coordinator
]Ph. D., M.Sc. (Computer Science), M.C.A., M.B.A[
Professional Certifications:
Certified Microsoft Innovative Educator
Data Science 101 Certification from Big Data University
R Language 101 Certification from Big Data University
SQL Certification from SOLOLEARN.com
Certified IBM Big Data 101 from Big Data University
R Program & Python Certified from DataCamp
Wiley Certified Big Data Analyst ]WCBDA[
Certification on DBMS from IIT Mumbai
Certified Cisco Certified Network Associate ]CCNA[
Certified Microsoft Certified Professional ]MCP[
Certified Brainbench in Computer Fundamentals, Microsoft Access, MySQL 5.7 Administration &
Microsoft Project
•Worked as Visiting Professor with Stratford University, USA for six months
from Jan’2016 to June’2016.
•Also worked at Bahrain University in Kingdom of Bahrain Sr. I.T. Faculty
(Computer Science Department) for Period of 2 Years.
•Have rich experience in the field of teaching and research in Computer
Science and Information Technology for almost 15+ years in Academia.
•Having experience of working with both private and public institutions and
universities as the lecturer and self-instruction material writer for Information
Technology courses.
•Had number of research papers published in national and international journals
and conference proceedings in IEEE and Scopus Index.
•Also chaired various National and International Conferences of repute and
associated with various International Journals as Editorial Board Member for
International and National, Academic Adviser and Research Paper Reviewer.
My current area of interest: Big Data Analytics, R Software, Management
Information System, IT Project Management, Decision Support System,
Business Analytics, Database Management System, Data Networking and
Advanced Excel with Visual Basic Macros.
Country Visited: USA, Canada, UK, UAE, Bahrain, Oman (Mostly for Teaching
and Research Purpose)
Profile of Dr. Kamal Gulati
Technical Program Committee for International Conference on Data, Engineering and
Applications 2017 (IDEA-2k17) which would be on October 28-29, 2017 at Bhopal.
http://www.ideaconference.in
Advisory Board Committee Member for International Conference on Energy, Communication,
Data Analytics and Soft Computing (ICECDS) which would be on 1-2 August 2017 at SKR
Engineering College, Poonamallee, Tamil Nadu, India.http://ecds.org.in
Advisory Committee Member for International Conference on Innovative Research in
Engineering and Science which would be on 16-17 June 2017 at Asian Institute of Technology
Conference Center Thailand.http://www.iresconf.org
Advisory Committee Member for International Conference on Cloud Computing and Internet of
everything which held on 10-11 Feb’2016 at Delhi-NCR.http://www.ccioet.org
Technical Committee member for InCITe-2016 (International Conference on Information
Technology) Theme - Internet of Things: Connect Your Worlds, IT Summit, Amity University
2016 which held on 06-07 Oct, 2016. http://www.amity.edu/incite2016
Technical Speaker for Global perspective on IT business “The Changing Scenario” – Big Data
on International Students Conference New Delhi (ISCND) which held on 14-15 Oct, 2016
http://iscnd.com
Advisory Committee Member for International Conference on Sustainable Computing
Techniques in Engineering, Science and Management which has held on 09-10 Sep’2016 at
Delhi-NCR. http://www.scesm.org
Technical Program Committee Member for Program Committee Member for International
Conference on Recent Trends IN ICT, Jaipur, India, Aug 18-19, 2017 http://rtict.org
Program Committee Member for International Conference on Recent Advancement in Computer
and Communication Bhopal, India, (IC-RAC-2017) May 26-27, 2017 http://www.icrac.co.in
Profile Contd….
Editorial Board member for the following International Journals:
International Journal of Computer Science and Innovation
http://www.infinitysciences.org
International Journal of Latest Research in Engineering and
Technology http://www.ijlret.com
International Journal of Latest Trends in Engineering and Technology
http://www.ijltet.org
InternationalJournalofApplicationorInnovationinEngineering
&Management http://www.ijaiem.org
International Journal for Management http://www.ijm-apm.com
ITM International Journal of Innovations in Science, Engineering &
Management www.iijisem.org
The International Journal of Emerging Engineering and Embedded
Systems http://www.ijeees.org
Conference Info http://conferenceinfo.org/tpc.php
International Journal of Computer Engineering in Research Trends
(IJCERT) http://www.ijcert.org

Expert Speaker for Program “Insurance Beyond Doubt” Presented by Oriental Insurance Co Ltd.
Profile Contd….
BOOK, CHAPTER, and CASE STUDY Published
Published Book on “A Study of Changing Trends in E-CRM of
Indian Insurance Industry” Published by LAP Lambert Academic
Publishing, one of the top researchers and renowned scientists
of Germany with ISBN: 3330009543, 9783330009547. The Book
available at Amazon.com.
Published Real Case Study on “IoT Security Considerations for
Higher Education” published on Business Cases - RENVOI 2017
BOOK (The Case Centre, UK) with ISBN: 978-1-4828-8840-9,
Page 63-70. The Book available at the various online website:
Amazon, AbeBooks, Chegg, Barnes & Noble.
Published Chapter on "Role of eWorld in Insurance Innovation"
Published by Insurance Institute of India (III), 60 Years Diamond
Jubilee, Compendium, Nov 2016 – (Magazine) – One of the
premium Insurance Institute of India.
Contact Details
Email : drkamalgulati@gmail.com
Website : http://mybigdataanalytics.in
LinkedIn : https://in.linkedin.com/in/drkamalgulati

More Related Content

What's hot

Basics of computer networks
Basics of computer networksBasics of computer networks
Basics of computer networksRubal Sagwal
 
Introduction to network
Introduction to networkIntroduction to network
Introduction to networkDhani Ahmad
 
Cloud security introduction
Cloud security introductionCloud security introduction
Cloud security introductionCalvin Lee
 
Types of Operating System
Types of Operating SystemTypes of Operating System
Types of Operating SystemHemant Raj
 
An introduction to networking
An introduction to networkingAn introduction to networking
An introduction to networkingJafar Nesargi
 
Network design
Network designNetwork design
Network designcsk selva
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System AdministrationDuressa Teshome
 
Network Design and Management
Network Design and ManagementNetwork Design and Management
Network Design and Managementtlerell
 
peer to peer and client server model
peer to peer and client server modelpeer to peer and client server model
peer to peer and client server modelBharath Nair
 
Computer network
Computer networkComputer network
Computer networkNeha Gupta
 
Data base management systems ppt
Data base management systems pptData base management systems ppt
Data base management systems pptsuthi
 
Ppt for tranmission media
Ppt for tranmission mediaPpt for tranmission media
Ppt for tranmission mediaManish8976
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking FundamentalsManjit Chavda
 
Build internet infrastructure LO1
Build internet infrastructure LO1Build internet infrastructure LO1
Build internet infrastructure LO1Abenezer Abiti
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 

What's hot (20)

Network Topologies in Simple (Logical, Physical and Types)
Network Topologies in Simple (Logical, Physical and Types)Network Topologies in Simple (Logical, Physical and Types)
Network Topologies in Simple (Logical, Physical and Types)
 
Basics of computer networks
Basics of computer networksBasics of computer networks
Basics of computer networks
 
Introduction to network
Introduction to networkIntroduction to network
Introduction to network
 
Cloud security introduction
Cloud security introductionCloud security introduction
Cloud security introduction
 
Types of Operating System
Types of Operating SystemTypes of Operating System
Types of Operating System
 
An introduction to networking
An introduction to networkingAn introduction to networking
An introduction to networking
 
Network design
Network designNetwork design
Network design
 
IT system and network administrator
IT system and network administratorIT system and network administrator
IT system and network administrator
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Network Design and Management
Network Design and ManagementNetwork Design and Management
Network Design and Management
 
peer to peer and client server model
peer to peer and client server modelpeer to peer and client server model
peer to peer and client server model
 
Computer network
Computer networkComputer network
Computer network
 
Data base management systems ppt
Data base management systems pptData base management systems ppt
Data base management systems ppt
 
Ppt for tranmission media
Ppt for tranmission mediaPpt for tranmission media
Ppt for tranmission media
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
 
Rdbms
RdbmsRdbms
Rdbms
 
Build internet infrastructure LO1
Build internet infrastructure LO1Build internet infrastructure LO1
Build internet infrastructure LO1
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Directory services
Directory servicesDirectory services
Directory services
 

Similar to Basic of Networking

CSS12 LESSON 02.pptx
CSS12 LESSON 02.pptxCSS12 LESSON 02.pptx
CSS12 LESSON 02.pptxRGSMags
 
Types of networks according
Types of networks accordingTypes of networks according
Types of networks accordingMicrobiology
 
Types of networks according to security
Types of networks according to securityTypes of networks according to security
Types of networks according to securityMicrobiology
 
networking concepts
networking conceptsnetworking concepts
networking conceptsmtguillermo
 
Networking course khurram shahzad
Networking course khurram shahzadNetworking course khurram shahzad
Networking course khurram shahzadkhurrak_shahzad
 
Chapter One Network nile.pptx
Chapter One Network nile.pptxChapter One Network nile.pptx
Chapter One Network nile.pptxMohamedAbdi347025
 
Types of networks according to security
Types of networks according to securityTypes of networks according to security
Types of networks according to securityAmjad Afridi
 
unit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfunit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfshubhangisonawane6
 
Chapter01 -- introduction to networking
Chapter01  -- introduction to networkingChapter01  -- introduction to networking
Chapter01 -- introduction to networkingRaja Waseem Akhtar
 
Computer Networking Theory Assignment 1
Computer Networking Theory Assignment 1Computer Networking Theory Assignment 1
Computer Networking Theory Assignment 1Hasibul Islam Nirob
 
Slides for Week 1 - Lec 2
Slides for Week 1 - Lec 2Slides for Week 1 - Lec 2
Slides for Week 1 - Lec 2webhostingguy
 
Introduction to networks
Introduction to networksIntroduction to networks
Introduction to networksSagar Gor
 
Network architecture
Network architectureNetwork architecture
Network architecturelinghazali
 

Similar to Basic of Networking (20)

CSS12 LESSON 02.pptx
CSS12 LESSON 02.pptxCSS12 LESSON 02.pptx
CSS12 LESSON 02.pptx
 
Types of networks according
Types of networks accordingTypes of networks according
Types of networks according
 
Types of networks according to security
Types of networks according to securityTypes of networks according to security
Types of networks according to security
 
networking concepts
networking conceptsnetworking concepts
networking concepts
 
Networking course khurram shahzad
Networking course khurram shahzadNetworking course khurram shahzad
Networking course khurram shahzad
 
Hardware1
Hardware1Hardware1
Hardware1
 
Hardware1
Hardware1Hardware1
Hardware1
 
Chapter One Network nile.pptx
Chapter One Network nile.pptxChapter One Network nile.pptx
Chapter One Network nile.pptx
 
Types of networks according to security
Types of networks according to securityTypes of networks according to security
Types of networks according to security
 
unit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfunit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdf
 
Compare peer
Compare peerCompare peer
Compare peer
 
Chapter01 -- introduction to networking
Chapter01  -- introduction to networkingChapter01  -- introduction to networking
Chapter01 -- introduction to networking
 
CSS 12 - Q1 - Lesson 3.pptx
CSS 12 - Q1 - Lesson 3.pptxCSS 12 - Q1 - Lesson 3.pptx
CSS 12 - Q1 - Lesson 3.pptx
 
Computer Networking Theory Assignment 1
Computer Networking Theory Assignment 1Computer Networking Theory Assignment 1
Computer Networking Theory Assignment 1
 
Slides for Week 1 - Lec 2
Slides for Week 1 - Lec 2Slides for Week 1 - Lec 2
Slides for Week 1 - Lec 2
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Introduction to networks
Introduction to networksIntroduction to networks
Introduction to networks
 
Networking
NetworkingNetworking
Networking
 
unit 4-1.pptx
unit 4-1.pptxunit 4-1.pptx
unit 4-1.pptx
 
Network architecture
Network architectureNetwork architecture
Network architecture
 

More from Amity University | FMS - DU | IMT | Stratford University | KKMI International Institute | AIMA | DTU

More from Amity University | FMS - DU | IMT | Stratford University | KKMI International Institute | AIMA | DTU (20)

All About DBMS - Interview Question and Answers
All About DBMS - Interview Question and AnswersAll About DBMS - Interview Question and Answers
All About DBMS - Interview Question and Answers
 
Concept of Governance - Management of Operational Risk for IT Officers/Execut...
Concept of Governance - Management of Operational Risk for IT Officers/Execut...Concept of Governance - Management of Operational Risk for IT Officers/Execut...
Concept of Governance - Management of Operational Risk for IT Officers/Execut...
 
Emerging Technologies in IT
Emerging Technologies in ITEmerging Technologies in IT
Emerging Technologies in IT
 
Introduction to DBMS - Notes in Layman...
Introduction to DBMS - Notes in Layman...Introduction to DBMS - Notes in Layman...
Introduction to DBMS - Notes in Layman...
 
Fundamentals of DBMS
Fundamentals of DBMSFundamentals of DBMS
Fundamentals of DBMS
 
CASE (Computer Aided Software Design)
CASE (Computer Aided Software Design)CASE (Computer Aided Software Design)
CASE (Computer Aided Software Design)
 
SOFTWARE RELIABILITY AND QUALITY ASSURANCE
SOFTWARE RELIABILITY AND QUALITY ASSURANCESOFTWARE RELIABILITY AND QUALITY ASSURANCE
SOFTWARE RELIABILITY AND QUALITY ASSURANCE
 
Software Testing (Contd..) SDLC Model
Software Testing (Contd..) SDLC ModelSoftware Testing (Contd..) SDLC Model
Software Testing (Contd..) SDLC Model
 
Software Testing - SDLC Model
Software Testing - SDLC ModelSoftware Testing - SDLC Model
Software Testing - SDLC Model
 
Coding - SDLC Model
Coding - SDLC ModelCoding - SDLC Model
Coding - SDLC Model
 
Software Design - SDLC Model
Software Design - SDLC ModelSoftware Design - SDLC Model
Software Design - SDLC Model
 
Models of SDLC (Contd..) & Feasibility Study
Models of SDLC (Contd..)  & Feasibility StudyModels of SDLC (Contd..)  & Feasibility Study
Models of SDLC (Contd..) & Feasibility Study
 
Models of SDLC (Software Development Life Cycle / Program Development Life Cy...
Models of SDLC (Software Development Life Cycle / Program Development Life Cy...Models of SDLC (Software Development Life Cycle / Program Development Life Cy...
Models of SDLC (Software Development Life Cycle / Program Development Life Cy...
 
Introduction to Software Engineering
Introduction to Software EngineeringIntroduction to Software Engineering
Introduction to Software Engineering
 
CLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKET
CLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKETCLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKET
CLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKET
 
Application Software
Application SoftwareApplication Software
Application Software
 
Application Software – Horizontal & Vertical Software
Application Software – Horizontal & Vertical SoftwareApplication Software – Horizontal & Vertical Software
Application Software – Horizontal & Vertical Software
 
Software: Systems and Application Software
Software:  Systems and Application SoftwareSoftware:  Systems and Application Software
Software: Systems and Application Software
 
Programming Languages
Programming LanguagesProgramming Languages
Programming Languages
 
Number Codes and Registers
Number Codes and RegistersNumber Codes and Registers
Number Codes and Registers
 

Recently uploaded

internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 

Recently uploaded (20)

internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 

Basic of Networking

  • 2. What is Networking?  Definition: A network connects two or more computers so that they can share information, applications or resources.
  • 3. Networking  Networks are simply a collection of resources connected by cable or other media so they can share information  Networks made sharing data much easier and more efficient for users.
  • 4. Network: To connect two or more computers together with the ability to communicate with each other
  • 5. Examples of Shared Resources  Printers  Fax devices  Files and Folders (Data)  Modems
  • 6. Example of Services  Email  Database  Internet Access
  • 7. Hardware tools / Network Components used in connecting system’s for a Network  NIC (Network Interface Card) or Ethernet  HUB (Repeater)  SWITCH  Transmission Medium – Cables / Wires, Connectors.  ROUTER  BRIDGE  MODEM  GATEWAY  WIRELESS CARD
  • 8. Network Components  Server : Powerful machine with a robust performance and power (e.g. Windows NT, 2000 Server, 2003 Server, Longhorn, Enterprise Linux)  Client: Uses the server’s services – any machine running a client software (e.g. Windows 3.11, 95, 98, ME, 2000, XP, Vista, 7, 8 etc ……)  Peer: Acts as both Client and Server
  • 9. Network Components  Media: Bounded (UTP, STP or Coax.) or unbounded( Satellite, Microwave or wireless)  Resources: anything that client uses  User: any person using the resources  Protocols: the rules of communication (TCP/IP, IPX/SPX,…..)
  • 10. Network Components Server Client Client Client Client Resources
  • 11. Networking  All systems on the link must follow a set of common communication rules called protocols.
  • 12. Networking Models  Peer-to-Peer  Server-Based It is important to remember that one type of networking configuration is not necessarily better than another.
  • 13. Peer-to-Peer  There are no dedicated servers  All the computers are equals and therefore are known as peer.  Each computer functions as both client and server,  No administrator  Each user determine what data to share
  • 15. Features of peer-to-peer network =<Size =<Cost =<Operating Systems =<Implementation =<Administration =<Sharing resources =<Server requirements =<Security
  • 16. Peer-To-Peer  Size  Peer-to-peer is called “workgroup”  Workgroup: small group of computers  In peer-to-peer there are 10 or less computers.
  • 17. Peer-To-Peer  Cost:  Is simple  Each computer functions as client and server, so there is no need to central server  Less expensive than server-based networks.
  • 18. Peer-To-Peer  Operating Systems  No additional software is required to set up a peer- to-peer network.
  • 19. Peer-to-Peer  Implementation  Peer-to-Peer implementation offers the following advantages:  Computers are located at users’ desks.  Users act as their own administrators and plan their own security.  Computers in the network are connected by a simple, easily visible cabling system.
  • 20. Peer-to-Peer  Where a Peer-to-Peer is appropriate  There are 10 users or fewer.  Users share resources, such as files and printers, but no specialized servers exist.  Security is not an issue  The organization and the network will experience only limited growth within the foreseeable future.
  • 21. Peer-to-Peer  Administration  Network administration tasks include:  Managing users and security  Making resources available  Maintaining applications and data  Installing and upgrading application & operating system software.
  • 22. Peer-to-Peer  Sharing resources  All users can share any of their resources in any manner they choose.  Resources include: data, printers, fax cards, and so on.  Server requirements  In a peer-to-peer, each computer must:  Use a large percentage of its resources to support the users (local user).  Use additional resources such as hard-disk space and memory to support user’s accessing resource on the network (remote user)
  • 23. Peer-to-Peer  Security: making computers and data safe from harm and unauthorized access.  Security consists of setting a password on a resources such as a folder that is shared on the network.  All users set their own security  Shared resources can exist on any computer rather than on a centralized server only.  Consequently, centralized control is difficult to maintain.  Low security because some users may not implement any security measures at all.
  • 24. Peer-to-Peer  Training  Users need training before they are able to function properly as both users & administrators of their computers.
  • 25. Peer-to-Peer  Inexpensive  Easy to set-up  Used for small offices  Reasonable number of users is 10  Easy to maintain
  • 26. Server-Based Networks  In a environment with more than 10 users, a peer-to-peer will properly not be adequate.  Therefore, most networks have dedicated servers.  Dedicated server: is one that functions only as server and is not used as client or workstation  Server: A powerful computer sometimes with a huge processing power  There are different types (e.g. file, print server, application, mail, proxy, DHCP and DNS servers)  The heart of the network, if it goes down, network will loose a lot!
  • 27. Server-Based Network Server Client Client Client Client Resources
  • 28. Specialized Servers  As network increase in size, more than one server is usually needed.  File & Print Servers  Manage user access and use of file and printers resources.
  • 29. Specialized Servers.  Application servers  Server store vast amount of data that is organized to make it easy to retrieve.  Application server differ from file and print server.  With file & print server: the data or file is downloaded to the computer making the request.
  • 30. Specialized Servers  Mail Servers  Operate like application servers in that there are separate server and client applications, with data selectively downloaded from the server to the client. (E.g. MS Exchange)
  • 31. Specialized Servers  Fax server  Manage fax traffic into and out of the network by sharing one or more fax modem boards.  Communications servers  Handle data flow and email messages between the servers’ own networks and other networks, or remote users.
  • 32. Specialized Servers  Directory service Servers  Enable users to locate, store, and secure information on the network.  For example: some server software combines computers into logical grouping called domains.
  • 33. Server-Based Network  Most of the mentioned functionality can be found on one platform (e.g. Windows 2000 / 2003 Server has the following:  DHCP and DNS servers  Proxy server (IIS 5.0)  File Server  Printer Server  For mail server, you should get MS Exchange
  • 34. The Role of software in Server- based Networks  A network server and its operating system work together as a unit.  No matter how powerful or advanced a server might be, it is useless without an operating system  Operating system takes advantages of its physical resources  Examples of server operating system: Microsoft and Novell.
  • 35. Server-Based (Advantages( Centralized security policies can be imposed East to back-up data Centralized administration (Network Administrator( Better Performance More secure Synchronized Files
  • 36. Server-Based (Disadvantages( Dependent on the network administrator Sometimes expensive server
  • 37. Dr. Kamal Gulati Associate Professor | University Quality Support Head | Mentoring Programme Coordinator ]Ph. D., M.Sc. (Computer Science), M.C.A., M.B.A[ Professional Certifications: Certified Microsoft Innovative Educator Data Science 101 Certification from Big Data University R Language 101 Certification from Big Data University SQL Certification from SOLOLEARN.com Certified IBM Big Data 101 from Big Data University R Program & Python Certified from DataCamp Wiley Certified Big Data Analyst ]WCBDA[ Certification on DBMS from IIT Mumbai Certified Cisco Certified Network Associate ]CCNA[ Certified Microsoft Certified Professional ]MCP[ Certified Brainbench in Computer Fundamentals, Microsoft Access, MySQL 5.7 Administration & Microsoft Project
  • 38. •Worked as Visiting Professor with Stratford University, USA for six months from Jan’2016 to June’2016. •Also worked at Bahrain University in Kingdom of Bahrain Sr. I.T. Faculty (Computer Science Department) for Period of 2 Years. •Have rich experience in the field of teaching and research in Computer Science and Information Technology for almost 15+ years in Academia. •Having experience of working with both private and public institutions and universities as the lecturer and self-instruction material writer for Information Technology courses. •Had number of research papers published in national and international journals and conference proceedings in IEEE and Scopus Index. •Also chaired various National and International Conferences of repute and associated with various International Journals as Editorial Board Member for International and National, Academic Adviser and Research Paper Reviewer. My current area of interest: Big Data Analytics, R Software, Management Information System, IT Project Management, Decision Support System, Business Analytics, Database Management System, Data Networking and Advanced Excel with Visual Basic Macros. Country Visited: USA, Canada, UK, UAE, Bahrain, Oman (Mostly for Teaching and Research Purpose) Profile of Dr. Kamal Gulati
  • 39. Technical Program Committee for International Conference on Data, Engineering and Applications 2017 (IDEA-2k17) which would be on October 28-29, 2017 at Bhopal. http://www.ideaconference.in Advisory Board Committee Member for International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS) which would be on 1-2 August 2017 at SKR Engineering College, Poonamallee, Tamil Nadu, India.http://ecds.org.in Advisory Committee Member for International Conference on Innovative Research in Engineering and Science which would be on 16-17 June 2017 at Asian Institute of Technology Conference Center Thailand.http://www.iresconf.org Advisory Committee Member for International Conference on Cloud Computing and Internet of everything which held on 10-11 Feb’2016 at Delhi-NCR.http://www.ccioet.org Technical Committee member for InCITe-2016 (International Conference on Information Technology) Theme - Internet of Things: Connect Your Worlds, IT Summit, Amity University 2016 which held on 06-07 Oct, 2016. http://www.amity.edu/incite2016 Technical Speaker for Global perspective on IT business “The Changing Scenario” – Big Data on International Students Conference New Delhi (ISCND) which held on 14-15 Oct, 2016 http://iscnd.com Advisory Committee Member for International Conference on Sustainable Computing Techniques in Engineering, Science and Management which has held on 09-10 Sep’2016 at Delhi-NCR. http://www.scesm.org Technical Program Committee Member for Program Committee Member for International Conference on Recent Trends IN ICT, Jaipur, India, Aug 18-19, 2017 http://rtict.org Program Committee Member for International Conference on Recent Advancement in Computer and Communication Bhopal, India, (IC-RAC-2017) May 26-27, 2017 http://www.icrac.co.in Profile Contd….
  • 40. Editorial Board member for the following International Journals: International Journal of Computer Science and Innovation http://www.infinitysciences.org International Journal of Latest Research in Engineering and Technology http://www.ijlret.com International Journal of Latest Trends in Engineering and Technology http://www.ijltet.org InternationalJournalofApplicationorInnovationinEngineering &Management http://www.ijaiem.org International Journal for Management http://www.ijm-apm.com ITM International Journal of Innovations in Science, Engineering & Management www.iijisem.org The International Journal of Emerging Engineering and Embedded Systems http://www.ijeees.org Conference Info http://conferenceinfo.org/tpc.php International Journal of Computer Engineering in Research Trends (IJCERT) http://www.ijcert.org  Expert Speaker for Program “Insurance Beyond Doubt” Presented by Oriental Insurance Co Ltd. Profile Contd….
  • 41. BOOK, CHAPTER, and CASE STUDY Published Published Book on “A Study of Changing Trends in E-CRM of Indian Insurance Industry” Published by LAP Lambert Academic Publishing, one of the top researchers and renowned scientists of Germany with ISBN: 3330009543, 9783330009547. The Book available at Amazon.com. Published Real Case Study on “IoT Security Considerations for Higher Education” published on Business Cases - RENVOI 2017 BOOK (The Case Centre, UK) with ISBN: 978-1-4828-8840-9, Page 63-70. The Book available at the various online website: Amazon, AbeBooks, Chegg, Barnes & Noble. Published Chapter on "Role of eWorld in Insurance Innovation" Published by Insurance Institute of India (III), 60 Years Diamond Jubilee, Compendium, Nov 2016 – (Magazine) – One of the premium Insurance Institute of India.
  • 42. Contact Details Email : drkamalgulati@gmail.com Website : http://mybigdataanalytics.in LinkedIn : https://in.linkedin.com/in/drkamalgulati