SlideShare a Scribd company logo
1 of 32
Mrs.R.Shanthi Prabha M.Sc., M.Phil.,
Assistant Professor,
DEPARTMENT OF CS
• Business Applications
• Home Applications
• Mobile Users
• Social Issues
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
 Resource Sharing
 Common Printer
 Backup Systems,
 VPN (Virtual Private Networks)
 Ending the limitation of geographic disperse
working environments.
 Client - Server
A network with two clients and one server
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
 Client-Server Model
 Data Sharing
 Web Application
 Personal Information Sharing
 Email
 VoIP
 Video
 Tele-Conferencing
 Desktop Sharing
 Telemedicine
 e-commerce
 Shopping from home
The client-server model involves requests and
replies
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
 Ken Olsen, 1977 President,
 Digital Equipment Corporation (DEC), Second
Largest Computer Company (after IBM) said
 “There is no reason for any individual to have a
computer in his home”
 Single Biggest Reason for purchasing a home
computer is Internet.
 Surfing the web is done for variety of reasons:
 Arts, Business, Cooking, Government, Health, History,
Hobbies, Recreation, Science, Sports, Travel, …
 Newspaper, online Digital Libraries,
 Client-Server Access vs Peer-to-Peer
Communication.
In a peer-to-peer system there are no fixed clients and
servers.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
 Peer-to-Peer Applications
 BitTorrent
 Sharing Music and Videos (Napster)
 Email, etc.
 Applications that involve interaction
between
 a person and a remote database
 Person-to-person communication
 Person – to – Person Communication
 Audi + Video (Smell may take a while!)
 Instant Messaging (Twitter)
 Online Audio (Radio Channels)
 Online Video (YouTube)
 Telelearning
 Social Networking:
 Facebook
 Wiki – Wikipedia
 Home Shopping
 Finances
 Online auctions (eBay)
Some forms of e-commerce
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
 Entertainment:
 MP3 and DVD-quality movies
 TV shows – IPTV (IP TeleVision)
 Interactive Live TV
 Game Playing
 Multiperson real-time simulation games.
 Ubiquitous Computing
 Smart Home Monitoring
 RDIF (Radio Frequency Identification)
 Replacing Bar Codes with a smart deivices that my
turn the real world inot the Internet of things.
 Mobile computers (handheld and laptops)
 Fastest growing segments in computer history.
 Individuals are able to use their mobile devices to:
 Read and send email,
 Tweet,
 Watch Movies,
 Download Music,
 Play Games,
 Serf the Web
 Internet connectivity allows for those applications to be
easily built
 Wireless Networks (Cars, Boats, and Airplanes can not have
wired Connections)
 Cellular Networks
 Wireless hotspots (802.11 Standard).
 Wireless Networking vs. Mobile Wireless Networks
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Combinations of wireless networks and mobile
computing
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
 Smart Phones – Integration of Internet with
Telephony
 Driving the wireless-mobile applications
 3G & 4G cellular networks provides fast data services
 GPS is a standard feature
 m-commerce (mobile commerce)
 NFC (Near Field Communication) smart phones act as an DFID
smartcard and interact with nearby reader for payment.
 Sensor Networks
 Notes that Sense/gather data about state of the physical world.
 It is revolutionizing science
 Wearable Computers
 Implantable Devices
 Pacemakers, Insulin pumps, …
 Controllable wirelessly
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
• Network neutrality
• Digital Millennium Copyright Act
• Profiling users
• Phishing
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
 Communications are not to be differentiated
by their
 content, or
 source, or
 who is providing the content
 Warning messages to the operators and the
users who are suspect of infringing
copyrights.
 Computer Networks make it very easy to
communicate.
 They also make it easy for the people who run
the network to snoop on the traffic.
 Sets up a conflict over issues such as employee
rights vs. employer rights.
 Government vs. Citizens rights.
 Companies collect data to Profile users.
 e-mail messages that masquerade as originating
from a trustworthy party.
 This is illegal activity.
 Encryption, technology that is already
developed, can solve the problem if not makes it
significantly harder to commit activities that are
illegal.
• Personal area networks
• Local area networks
• Metropolitan area networks
• Wide area networks
• The internet
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
 Transmission Technology
 Scale
 Two types of transmission technologies:
 Broadcast
 Communication channel shared by all machines
 Packets send by any machine are received by all the others.
 An address field within each packed specifies the intended recipient.
 If packed is intended for some other machine, it is just ignored
 If packed is indented for the recipient machine then it is processed.
 Wireless network is a common example of a broadcast link
 Communication is shared over a coverage region that depends on the wireless channel and the
transmitting machine.
 Broadcast systems usually also allow the possibility of addressing a
packet to all destinations.
 Point-to-point
 Connect individual pairs of machines
 Packets (short messages) may have to visit one or more
intermediates machines.
 Multiple routes of different lengths are possible.
 Finding good ones is important.
 Unicasting – transmission with exactly one sender and exactly
one receiver.
 Alternative Criteria: Scale
 Distance is important as a classification metric because
different technologies are used at different scales.
Classification of interconnected processors by
scale.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Bluetooth PAN (Personal Area Network)
configuration
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Wireless and wired LANs.
(a) IEEE 802.11 or WiFi.
(b) Switched Ethernet (802.3).
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
 Switched Ethernet
 Switch; Hardware that connects two devices point-to-point
 A Switch has multiple ports
 Physical vs. Virtual LAN – VLAN
 Dynamic vs. Static Channel Allocation
 Static Allocation: Each device is allocated its time slot
weather or not it uses it.
 Dynamic methods allow changing the time allocation
scheme.
 Dynamic Allocation
 Centralized
 Decentralized
A metropolitan area network based on cable TV.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
WAN that connects three branch offices in Australia
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
WAN using a virtual private network.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
WAN using an ISP network.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011

More Related Content

What's hot

Web 3.0 & Internet of Things
Web 3.0 & Internet of Things Web 3.0 & Internet of Things
Web 3.0 & Internet of Things Chris Becker
 
Computer networks--introduction computer-networking
Computer networks--introduction computer-networkingComputer networks--introduction computer-networking
Computer networks--introduction computer-networkingVIJAY TRIPATHI (DSS Basti)
 
Skr+3200+chapter+1+(kweh)
Skr+3200+chapter+1+(kweh)Skr+3200+chapter+1+(kweh)
Skr+3200+chapter+1+(kweh)Ammar Shafiq
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 8 - The Int...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 8 - The Int...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 8 - The Int...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 8 - The Int...yaminohime
 
Network and Types of Networks
Network and Types of NetworksNetwork and Types of Networks
Network and Types of NetworksUttar Tamang ✔
 
Module1 introduction to network
Module1 introduction to networkModule1 introduction to network
Module1 introduction to networkMiz Malinz
 
Data Communications: History and Standard Organizations
Data Communications: History and Standard OrganizationsData Communications: History and Standard Organizations
Data Communications: History and Standard OrganizationsJhan-Curt Fernandez
 
Internet Appendix A
Internet Appendix AInternet Appendix A
Internet Appendix Adpd
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networkssanjeev kumar
 
Introduction of Computer Networking Technoloy
Introduction of Computer Networking TechnoloyIntroduction of Computer Networking Technoloy
Introduction of Computer Networking TechnoloyAmmar Rahman
 
Computer Networks - PPT
Computer Networks - PPTComputer Networks - PPT
Computer Networks - PPTDhivya T
 
Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)saurabh goel
 
Computer networks
Computer networksComputer networks
Computer networksSudar Sudar
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networkingZaeem Hassan
 
Computer communication and internet
Computer communication and internetComputer communication and internet
Computer communication and interneteVidhya
 

What's hot (20)

Web 3.0 & Internet of Things
Web 3.0 & Internet of Things Web 3.0 & Internet of Things
Web 3.0 & Internet of Things
 
Computer networks--introduction computer-networking
Computer networks--introduction computer-networkingComputer networks--introduction computer-networking
Computer networks--introduction computer-networking
 
Mmc unit i summary
Mmc unit i summaryMmc unit i summary
Mmc unit i summary
 
Skr+3200+chapter+1+(kweh)
Skr+3200+chapter+1+(kweh)Skr+3200+chapter+1+(kweh)
Skr+3200+chapter+1+(kweh)
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 8 - The Int...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 8 - The Int...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 8 - The Int...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 8 - The Int...
 
Network and Types of Networks
Network and Types of NetworksNetwork and Types of Networks
Network and Types of Networks
 
Lesson 1 introduction
Lesson 1 introductionLesson 1 introduction
Lesson 1 introduction
 
Module1 introduction to network
Module1 introduction to networkModule1 introduction to network
Module1 introduction to network
 
niceData com.
niceData com.niceData com.
niceData com.
 
Data Communications: History and Standard Organizations
Data Communications: History and Standard OrganizationsData Communications: History and Standard Organizations
Data Communications: History and Standard Organizations
 
Internet Appendix A
Internet Appendix AInternet Appendix A
Internet Appendix A
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
 
Introduction of Computer Networking Technoloy
Introduction of Computer Networking TechnoloyIntroduction of Computer Networking Technoloy
Introduction of Computer Networking Technoloy
 
Computer Networks - PPT
Computer Networks - PPTComputer Networks - PPT
Computer Networks - PPT
 
Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)
 
Computer networks
Computer networksComputer networks
Computer networks
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networking
 
Computer communication and internet
Computer communication and internetComputer communication and internet
Computer communication and internet
 
Cct203 lesson 10
Cct203 lesson 10Cct203 lesson 10
Cct203 lesson 10
 
Network
NetworkNetwork
Network
 

Similar to Computer networks

Computer networks bharathiyar Unit I.pdf
Computer networks bharathiyar Unit I.pdfComputer networks bharathiyar Unit I.pdf
Computer networks bharathiyar Unit I.pdfYuvaraj471177
 
Chapter1-Introduction.ppt
Chapter1-Introduction.pptChapter1-Introduction.ppt
Chapter1-Introduction.pptrupeshchavan36
 
Chapter1 computer introduction note
Chapter1  computer introduction note Chapter1  computer introduction note
Chapter1 computer introduction note arvind pandey
 
Using Interconnected Computer Networks For Communication
Using Interconnected Computer Networks For CommunicationUsing Interconnected Computer Networks For Communication
Using Interconnected Computer Networks For CommunicationChelsea Porter
 
THE INTERNET AND NETWORK STANARDS
THE INTERNET AND NETWORK STANARDSTHE INTERNET AND NETWORK STANARDS
THE INTERNET AND NETWORK STANARDSwajahat Gul
 
Computer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.pptComputer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.pptmv9499596
 
FYBSC IT Web Programming Unit I Introduction to Web Programming
FYBSC IT Web Programming Unit I  Introduction to Web ProgrammingFYBSC IT Web Programming Unit I  Introduction to Web Programming
FYBSC IT Web Programming Unit I Introduction to Web ProgrammingArti Parab Academics
 
Uses Of Voice Over Internet Protocol
Uses Of Voice Over Internet ProtocolUses Of Voice Over Internet Protocol
Uses Of Voice Over Internet ProtocolTara Hardin
 
Laudon traver ec10-ppt_ch03
Laudon traver ec10-ppt_ch03Laudon traver ec10-ppt_ch03
Laudon traver ec10-ppt_ch03BookStoreLib
 

Similar to Computer networks (20)

Computer networks bharathiyar Unit I.pdf
Computer networks bharathiyar Unit I.pdfComputer networks bharathiyar Unit I.pdf
Computer networks bharathiyar Unit I.pdf
 
Chapter1-Introduction.ppt
Chapter1-Introduction.pptChapter1-Introduction.ppt
Chapter1-Introduction.ppt
 
Chapter1 computer introduction note
Chapter1  computer introduction note Chapter1  computer introduction note
Chapter1 computer introduction note
 
Using Interconnected Computer Networks For Communication
Using Interconnected Computer Networks For CommunicationUsing Interconnected Computer Networks For Communication
Using Interconnected Computer Networks For Communication
 
THE INTERNET AND NETWORK STANARDS
THE INTERNET AND NETWORK STANARDSTHE INTERNET AND NETWORK STANARDS
THE INTERNET AND NETWORK STANARDS
 
Akki
AkkiAkki
Akki
 
Computer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.pptComputer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.ppt
 
FYBSC IT Web Programming Unit I Introduction to Web Programming
FYBSC IT Web Programming Unit I  Introduction to Web ProgrammingFYBSC IT Web Programming Unit I  Introduction to Web Programming
FYBSC IT Web Programming Unit I Introduction to Web Programming
 
Pranjal Mishra ppt
Pranjal Mishra pptPranjal Mishra ppt
Pranjal Mishra ppt
 
Internet ...
Internet ...Internet ...
Internet ...
 
E content internet
E   content internetE   content internet
E content internet
 
Uses Of Voice Over Internet Protocol
Uses Of Voice Over Internet ProtocolUses Of Voice Over Internet Protocol
Uses Of Voice Over Internet Protocol
 
Essay On Networking
Essay On NetworkingEssay On Networking
Essay On Networking
 
Fg c
Fg cFg c
Fg c
 
INTERNET
INTERNET INTERNET
INTERNET
 
INTERNET
INTERNET INTERNET
INTERNET
 
Laudon traver ec10-ppt_ch03
Laudon traver ec10-ppt_ch03Laudon traver ec10-ppt_ch03
Laudon traver ec10-ppt_ch03
 
Laudon traver ec10-ppt_ch03
Laudon traver ec10-ppt_ch03Laudon traver ec10-ppt_ch03
Laudon traver ec10-ppt_ch03
 
Computer 3
Computer 3Computer 3
Computer 3
 
Unit.1.basic web.tech
Unit.1.basic web.techUnit.1.basic web.tech
Unit.1.basic web.tech
 

More from shanthishyam

C&NS_FIREWALLS.ppt
C&NS_FIREWALLS.pptC&NS_FIREWALLS.ppt
C&NS_FIREWALLS.pptshanthishyam
 
Cryptography and Network Security_Chapter 1.ppt
Cryptography and Network Security_Chapter 1.pptCryptography and Network Security_Chapter 1.ppt
Cryptography and Network Security_Chapter 1.pptshanthishyam
 
TOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptTOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptshanthishyam
 
SINGLE SOURCE SHORTEST PATH.ppt
SINGLE SOURCE SHORTEST PATH.pptSINGLE SOURCE SHORTEST PATH.ppt
SINGLE SOURCE SHORTEST PATH.pptshanthishyam
 
FDS- Basic Concepts.ppt
FDS- Basic Concepts.pptFDS- Basic Concepts.ppt
FDS- Basic Concepts.pptshanthishyam
 
Three dimensional geometric transformations
Three dimensional geometric transformationsThree dimensional geometric transformations
Three dimensional geometric transformationsshanthishyam
 
OSI reference model
OSI reference modelOSI reference model
OSI reference modelshanthishyam
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securityshanthishyam
 

More from shanthishyam (10)

C&NS_FIREWALLS.ppt
C&NS_FIREWALLS.pptC&NS_FIREWALLS.ppt
C&NS_FIREWALLS.ppt
 
Cryptography and Network Security_Chapter 1.ppt
Cryptography and Network Security_Chapter 1.pptCryptography and Network Security_Chapter 1.ppt
Cryptography and Network Security_Chapter 1.ppt
 
TOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptTOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.ppt
 
SINGLE SOURCE SHORTEST PATH.ppt
SINGLE SOURCE SHORTEST PATH.pptSINGLE SOURCE SHORTEST PATH.ppt
SINGLE SOURCE SHORTEST PATH.ppt
 
FDS- Basic Concepts.ppt
FDS- Basic Concepts.pptFDS- Basic Concepts.ppt
FDS- Basic Concepts.ppt
 
Three dimensional geometric transformations
Three dimensional geometric transformationsThree dimensional geometric transformations
Three dimensional geometric transformations
 
OSI reference model
OSI reference modelOSI reference model
OSI reference model
 
Database concepts
Database conceptsDatabase concepts
Database concepts
 
Curve modeling
Curve modelingCurve modeling
Curve modeling
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 

Recently uploaded

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 

Recently uploaded (20)

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 

Computer networks

  • 1. Mrs.R.Shanthi Prabha M.Sc., M.Phil., Assistant Professor, DEPARTMENT OF CS
  • 2. • Business Applications • Home Applications • Mobile Users • Social Issues Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
  • 3.  Resource Sharing  Common Printer  Backup Systems,  VPN (Virtual Private Networks)  Ending the limitation of geographic disperse working environments.  Client - Server
  • 4. A network with two clients and one server Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
  • 5.  Client-Server Model  Data Sharing  Web Application  Personal Information Sharing  Email  VoIP  Video  Tele-Conferencing  Desktop Sharing  Telemedicine  e-commerce  Shopping from home
  • 6. The client-server model involves requests and replies Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
  • 7.  Ken Olsen, 1977 President,  Digital Equipment Corporation (DEC), Second Largest Computer Company (after IBM) said  “There is no reason for any individual to have a computer in his home”  Single Biggest Reason for purchasing a home computer is Internet.  Surfing the web is done for variety of reasons:  Arts, Business, Cooking, Government, Health, History, Hobbies, Recreation, Science, Sports, Travel, …  Newspaper, online Digital Libraries,  Client-Server Access vs Peer-to-Peer Communication.
  • 8. In a peer-to-peer system there are no fixed clients and servers. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
  • 9.  Peer-to-Peer Applications  BitTorrent  Sharing Music and Videos (Napster)  Email, etc.  Applications that involve interaction between  a person and a remote database  Person-to-person communication
  • 10.  Person – to – Person Communication  Audi + Video (Smell may take a while!)  Instant Messaging (Twitter)  Online Audio (Radio Channels)  Online Video (YouTube)  Telelearning  Social Networking:  Facebook  Wiki – Wikipedia  Home Shopping  Finances  Online auctions (eBay)
  • 11. Some forms of e-commerce Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
  • 12.  Entertainment:  MP3 and DVD-quality movies  TV shows – IPTV (IP TeleVision)  Interactive Live TV  Game Playing  Multiperson real-time simulation games.  Ubiquitous Computing  Smart Home Monitoring  RDIF (Radio Frequency Identification)  Replacing Bar Codes with a smart deivices that my turn the real world inot the Internet of things.
  • 13.  Mobile computers (handheld and laptops)  Fastest growing segments in computer history.  Individuals are able to use their mobile devices to:  Read and send email,  Tweet,  Watch Movies,  Download Music,  Play Games,  Serf the Web  Internet connectivity allows for those applications to be easily built  Wireless Networks (Cars, Boats, and Airplanes can not have wired Connections)  Cellular Networks  Wireless hotspots (802.11 Standard).  Wireless Networking vs. Mobile Wireless Networks Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
  • 14. Combinations of wireless networks and mobile computing Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
  • 15.  Smart Phones – Integration of Internet with Telephony  Driving the wireless-mobile applications  3G & 4G cellular networks provides fast data services  GPS is a standard feature  m-commerce (mobile commerce)  NFC (Near Field Communication) smart phones act as an DFID smartcard and interact with nearby reader for payment.  Sensor Networks  Notes that Sense/gather data about state of the physical world.  It is revolutionizing science  Wearable Computers  Implantable Devices  Pacemakers, Insulin pumps, …  Controllable wirelessly Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
  • 16. • Network neutrality • Digital Millennium Copyright Act • Profiling users • Phishing Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
  • 17.  Communications are not to be differentiated by their  content, or  source, or  who is providing the content
  • 18.  Warning messages to the operators and the users who are suspect of infringing copyrights.
  • 19.  Computer Networks make it very easy to communicate.  They also make it easy for the people who run the network to snoop on the traffic.  Sets up a conflict over issues such as employee rights vs. employer rights.  Government vs. Citizens rights.  Companies collect data to Profile users.
  • 20.  e-mail messages that masquerade as originating from a trustworthy party.  This is illegal activity.  Encryption, technology that is already developed, can solve the problem if not makes it significantly harder to commit activities that are illegal.
  • 21. • Personal area networks • Local area networks • Metropolitan area networks • Wide area networks • The internet Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
  • 23.  Two types of transmission technologies:  Broadcast  Communication channel shared by all machines  Packets send by any machine are received by all the others.  An address field within each packed specifies the intended recipient.  If packed is intended for some other machine, it is just ignored  If packed is indented for the recipient machine then it is processed.  Wireless network is a common example of a broadcast link  Communication is shared over a coverage region that depends on the wireless channel and the transmitting machine.  Broadcast systems usually also allow the possibility of addressing a packet to all destinations.  Point-to-point  Connect individual pairs of machines  Packets (short messages) may have to visit one or more intermediates machines.  Multiple routes of different lengths are possible.  Finding good ones is important.  Unicasting – transmission with exactly one sender and exactly one receiver.
  • 24.  Alternative Criteria: Scale  Distance is important as a classification metric because different technologies are used at different scales.
  • 25. Classification of interconnected processors by scale. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
  • 26. Bluetooth PAN (Personal Area Network) configuration Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
  • 27. Wireless and wired LANs. (a) IEEE 802.11 or WiFi. (b) Switched Ethernet (802.3). Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
  • 28.  Switched Ethernet  Switch; Hardware that connects two devices point-to-point  A Switch has multiple ports  Physical vs. Virtual LAN – VLAN  Dynamic vs. Static Channel Allocation  Static Allocation: Each device is allocated its time slot weather or not it uses it.  Dynamic methods allow changing the time allocation scheme.  Dynamic Allocation  Centralized  Decentralized
  • 29. A metropolitan area network based on cable TV. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
  • 30. WAN that connects three branch offices in Australia Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
  • 31. WAN using a virtual private network. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
  • 32. WAN using an ISP network. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011