SlideShare a Scribd company logo
Mrs.R.Shanthi Prabha M.Sc., M.Phil.,
Assistant Professor,
DEPARTMENT OF CS
• Business Applications
• Home Applications
• Mobile Users
• Social Issues
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
 Resource Sharing
 Common Printer
 Backup Systems,
 VPN (Virtual Private Networks)
 Ending the limitation of geographic disperse
working environments.
 Client - Server
A network with two clients and one server
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
 Client-Server Model
 Data Sharing
 Web Application
 Personal Information Sharing
 Email
 VoIP
 Video
 Tele-Conferencing
 Desktop Sharing
 Telemedicine
 e-commerce
 Shopping from home
The client-server model involves requests and
replies
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
 Ken Olsen, 1977 President,
 Digital Equipment Corporation (DEC), Second
Largest Computer Company (after IBM) said
 “There is no reason for any individual to have a
computer in his home”
 Single Biggest Reason for purchasing a home
computer is Internet.
 Surfing the web is done for variety of reasons:
 Arts, Business, Cooking, Government, Health, History,
Hobbies, Recreation, Science, Sports, Travel, …
 Newspaper, online Digital Libraries,
 Client-Server Access vs Peer-to-Peer
Communication.
In a peer-to-peer system there are no fixed clients and
servers.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
 Peer-to-Peer Applications
 BitTorrent
 Sharing Music and Videos (Napster)
 Email, etc.
 Applications that involve interaction
between
 a person and a remote database
 Person-to-person communication
 Person – to – Person Communication
 Audi + Video (Smell may take a while!)
 Instant Messaging (Twitter)
 Online Audio (Radio Channels)
 Online Video (YouTube)
 Telelearning
 Social Networking:
 Facebook
 Wiki – Wikipedia
 Home Shopping
 Finances
 Online auctions (eBay)
Some forms of e-commerce
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
 Entertainment:
 MP3 and DVD-quality movies
 TV shows – IPTV (IP TeleVision)
 Interactive Live TV
 Game Playing
 Multiperson real-time simulation games.
 Ubiquitous Computing
 Smart Home Monitoring
 RDIF (Radio Frequency Identification)
 Replacing Bar Codes with a smart deivices that my
turn the real world inot the Internet of things.
 Mobile computers (handheld and laptops)
 Fastest growing segments in computer history.
 Individuals are able to use their mobile devices to:
 Read and send email,
 Tweet,
 Watch Movies,
 Download Music,
 Play Games,
 Serf the Web
 Internet connectivity allows for those applications to be
easily built
 Wireless Networks (Cars, Boats, and Airplanes can not have
wired Connections)
 Cellular Networks
 Wireless hotspots (802.11 Standard).
 Wireless Networking vs. Mobile Wireless Networks
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Combinations of wireless networks and mobile
computing
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
 Smart Phones – Integration of Internet with
Telephony
 Driving the wireless-mobile applications
 3G & 4G cellular networks provides fast data services
 GPS is a standard feature
 m-commerce (mobile commerce)
 NFC (Near Field Communication) smart phones act as an DFID
smartcard and interact with nearby reader for payment.
 Sensor Networks
 Notes that Sense/gather data about state of the physical world.
 It is revolutionizing science
 Wearable Computers
 Implantable Devices
 Pacemakers, Insulin pumps, …
 Controllable wirelessly
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
• Network neutrality
• Digital Millennium Copyright Act
• Profiling users
• Phishing
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
 Communications are not to be differentiated
by their
 content, or
 source, or
 who is providing the content
 Warning messages to the operators and the
users who are suspect of infringing
copyrights.
 Computer Networks make it very easy to
communicate.
 They also make it easy for the people who run
the network to snoop on the traffic.
 Sets up a conflict over issues such as employee
rights vs. employer rights.
 Government vs. Citizens rights.
 Companies collect data to Profile users.
 e-mail messages that masquerade as originating
from a trustworthy party.
 This is illegal activity.
 Encryption, technology that is already
developed, can solve the problem if not makes it
significantly harder to commit activities that are
illegal.
• Personal area networks
• Local area networks
• Metropolitan area networks
• Wide area networks
• The internet
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
 Transmission Technology
 Scale
 Two types of transmission technologies:
 Broadcast
 Communication channel shared by all machines
 Packets send by any machine are received by all the others.
 An address field within each packed specifies the intended recipient.
 If packed is intended for some other machine, it is just ignored
 If packed is indented for the recipient machine then it is processed.
 Wireless network is a common example of a broadcast link
 Communication is shared over a coverage region that depends on the wireless channel and the
transmitting machine.
 Broadcast systems usually also allow the possibility of addressing a
packet to all destinations.
 Point-to-point
 Connect individual pairs of machines
 Packets (short messages) may have to visit one or more
intermediates machines.
 Multiple routes of different lengths are possible.
 Finding good ones is important.
 Unicasting – transmission with exactly one sender and exactly
one receiver.
 Alternative Criteria: Scale
 Distance is important as a classification metric because
different technologies are used at different scales.
Classification of interconnected processors by
scale.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Bluetooth PAN (Personal Area Network)
configuration
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Wireless and wired LANs.
(a) IEEE 802.11 or WiFi.
(b) Switched Ethernet (802.3).
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
 Switched Ethernet
 Switch; Hardware that connects two devices point-to-point
 A Switch has multiple ports
 Physical vs. Virtual LAN – VLAN
 Dynamic vs. Static Channel Allocation
 Static Allocation: Each device is allocated its time slot
weather or not it uses it.
 Dynamic methods allow changing the time allocation
scheme.
 Dynamic Allocation
 Centralized
 Decentralized
A metropolitan area network based on cable TV.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
WAN that connects three branch offices in Australia
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
WAN using a virtual private network.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
WAN using an ISP network.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011

More Related Content

What's hot

Web 3.0 & Internet of Things
Web 3.0 & Internet of Things Web 3.0 & Internet of Things
Web 3.0 & Internet of Things
Chris Becker
 
Computer networks--introduction computer-networking
Computer networks--introduction computer-networkingComputer networks--introduction computer-networking
Computer networks--introduction computer-networking
VIJAY TRIPATHI (DSS Basti)
 
Mmc unit i summary
Mmc unit i summaryMmc unit i summary
Mmc unit i summary
AsstProfITVelTechChe
 
Skr+3200+chapter+1+(kweh)
Skr+3200+chapter+1+(kweh)Skr+3200+chapter+1+(kweh)
Skr+3200+chapter+1+(kweh)Ammar Shafiq
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 8 - The Int...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 8 - The Int...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 8 - The Int...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 8 - The Int...
yaminohime
 
Network and Types of Networks
Network and Types of NetworksNetwork and Types of Networks
Network and Types of Networks
Uttar Tamang ✔
 
Lesson 1 introduction
Lesson 1 introductionLesson 1 introduction
Lesson 1 introduction
MdAlifKhanRifat
 
Module1 introduction to network
Module1 introduction to networkModule1 introduction to network
Module1 introduction to networkMiz Malinz
 
niceData com.
niceData com.niceData com.
niceData com.
janiceramirez07
 
Data Communications: History and Standard Organizations
Data Communications: History and Standard OrganizationsData Communications: History and Standard Organizations
Data Communications: History and Standard Organizations
Jhan-Curt Fernandez
 
Internet Appendix A
Internet Appendix AInternet Appendix A
Internet Appendix A
dpd
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
sanjeev kumar
 
Introduction of Computer Networking Technoloy
Introduction of Computer Networking TechnoloyIntroduction of Computer Networking Technoloy
Introduction of Computer Networking TechnoloyAmmar Rahman
 
Computer Networks - PPT
Computer Networks - PPTComputer Networks - PPT
Computer Networks - PPT
Dhivya T
 
Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)
saurabh goel
 
Computer networks
Computer networksComputer networks
Computer networks
Sudar Sudar
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networking
Zaeem Hassan
 
Computer communication and internet
Computer communication and internetComputer communication and internet
Computer communication and internet
eVidhya
 
Network
NetworkNetwork
Network
Farhad Khidr
 

What's hot (20)

Web 3.0 & Internet of Things
Web 3.0 & Internet of Things Web 3.0 & Internet of Things
Web 3.0 & Internet of Things
 
Computer networks--introduction computer-networking
Computer networks--introduction computer-networkingComputer networks--introduction computer-networking
Computer networks--introduction computer-networking
 
Mmc unit i summary
Mmc unit i summaryMmc unit i summary
Mmc unit i summary
 
Skr+3200+chapter+1+(kweh)
Skr+3200+chapter+1+(kweh)Skr+3200+chapter+1+(kweh)
Skr+3200+chapter+1+(kweh)
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 8 - The Int...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 8 - The Int...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 8 - The Int...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 8 - The Int...
 
Network and Types of Networks
Network and Types of NetworksNetwork and Types of Networks
Network and Types of Networks
 
Lesson 1 introduction
Lesson 1 introductionLesson 1 introduction
Lesson 1 introduction
 
Module1 introduction to network
Module1 introduction to networkModule1 introduction to network
Module1 introduction to network
 
niceData com.
niceData com.niceData com.
niceData com.
 
Data Communications: History and Standard Organizations
Data Communications: History and Standard OrganizationsData Communications: History and Standard Organizations
Data Communications: History and Standard Organizations
 
Internet Appendix A
Internet Appendix AInternet Appendix A
Internet Appendix A
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
 
Introduction of Computer Networking Technoloy
Introduction of Computer Networking TechnoloyIntroduction of Computer Networking Technoloy
Introduction of Computer Networking Technoloy
 
Computer Networks - PPT
Computer Networks - PPTComputer Networks - PPT
Computer Networks - PPT
 
Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)
 
Computer networks
Computer networksComputer networks
Computer networks
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networking
 
Computer communication and internet
Computer communication and internetComputer communication and internet
Computer communication and internet
 
Cct203 lesson 10
Cct203 lesson 10Cct203 lesson 10
Cct203 lesson 10
 
Network
NetworkNetwork
Network
 

Similar to Computer networks

Computer networks bharathiyar Unit I.pdf
Computer networks bharathiyar Unit I.pdfComputer networks bharathiyar Unit I.pdf
Computer networks bharathiyar Unit I.pdf
Yuvaraj471177
 
Chapter1 computer introduction note
Chapter1  computer introduction note Chapter1  computer introduction note
Chapter1 computer introduction note
arvind pandey
 
Chapter1-Introduction.ppt
Chapter1-Introduction.pptChapter1-Introduction.ppt
Chapter1-Introduction.ppt
rupeshchavan36
 
Using Interconnected Computer Networks For Communication
Using Interconnected Computer Networks For CommunicationUsing Interconnected Computer Networks For Communication
Using Interconnected Computer Networks For Communication
Chelsea Porter
 
THE INTERNET AND NETWORK STANARDS
THE INTERNET AND NETWORK STANARDSTHE INTERNET AND NETWORK STANARDS
THE INTERNET AND NETWORK STANARDS
wajahat Gul
 
Computer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.pptComputer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.ppt
mv9499596
 
FYBSC IT Web Programming Unit I Introduction to Web Programming
FYBSC IT Web Programming Unit I  Introduction to Web ProgrammingFYBSC IT Web Programming Unit I  Introduction to Web Programming
FYBSC IT Web Programming Unit I Introduction to Web Programming
Arti Parab Academics
 
E content internet
E   content internetE   content internet
E content internet
Kaliyamurthi Punitha Devi
 
Chapter 1-Computer Networks-Basics chap.pdf
Chapter 1-Computer Networks-Basics chap.pdfChapter 1-Computer Networks-Basics chap.pdf
Chapter 1-Computer Networks-Basics chap.pdf
Aravinda Thejas Chandra
 
Uses Of Voice Over Internet Protocol
Uses Of Voice Over Internet ProtocolUses Of Voice Over Internet Protocol
Uses Of Voice Over Internet Protocol
Tara Hardin
 
Essay On Networking
Essay On NetworkingEssay On Networking
Essay On Networking
Cheap Paper Writing Services
 
INTERNET
INTERNET INTERNET
INTERNET
chandanasl1
 
INTERNET
INTERNET INTERNET
INTERNET
chandanasl1
 
Laudon traver ec10-ppt_ch03
Laudon traver ec10-ppt_ch03Laudon traver ec10-ppt_ch03
Laudon traver ec10-ppt_ch03
BookStoreLib
 
Laudon traver ec10-ppt_ch03
Laudon traver ec10-ppt_ch03Laudon traver ec10-ppt_ch03
Laudon traver ec10-ppt_ch03
Premkumar Balaraman
 

Similar to Computer networks (20)

Computer networks bharathiyar Unit I.pdf
Computer networks bharathiyar Unit I.pdfComputer networks bharathiyar Unit I.pdf
Computer networks bharathiyar Unit I.pdf
 
Chapter1 computer introduction note
Chapter1  computer introduction note Chapter1  computer introduction note
Chapter1 computer introduction note
 
Chapter1-Introduction.ppt
Chapter1-Introduction.pptChapter1-Introduction.ppt
Chapter1-Introduction.ppt
 
Using Interconnected Computer Networks For Communication
Using Interconnected Computer Networks For CommunicationUsing Interconnected Computer Networks For Communication
Using Interconnected Computer Networks For Communication
 
THE INTERNET AND NETWORK STANARDS
THE INTERNET AND NETWORK STANARDSTHE INTERNET AND NETWORK STANARDS
THE INTERNET AND NETWORK STANARDS
 
Akki
AkkiAkki
Akki
 
Computer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.pptComputer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.ppt
 
FYBSC IT Web Programming Unit I Introduction to Web Programming
FYBSC IT Web Programming Unit I  Introduction to Web ProgrammingFYBSC IT Web Programming Unit I  Introduction to Web Programming
FYBSC IT Web Programming Unit I Introduction to Web Programming
 
Pranjal Mishra ppt
Pranjal Mishra pptPranjal Mishra ppt
Pranjal Mishra ppt
 
Internet ...
Internet ...Internet ...
Internet ...
 
E content internet
E   content internetE   content internet
E content internet
 
Chapter 1-Computer Networks-Basics chap.pdf
Chapter 1-Computer Networks-Basics chap.pdfChapter 1-Computer Networks-Basics chap.pdf
Chapter 1-Computer Networks-Basics chap.pdf
 
Uses Of Voice Over Internet Protocol
Uses Of Voice Over Internet ProtocolUses Of Voice Over Internet Protocol
Uses Of Voice Over Internet Protocol
 
Essay On Networking
Essay On NetworkingEssay On Networking
Essay On Networking
 
Fg c
Fg cFg c
Fg c
 
INTERNET
INTERNET INTERNET
INTERNET
 
INTERNET
INTERNET INTERNET
INTERNET
 
Laudon traver ec10-ppt_ch03
Laudon traver ec10-ppt_ch03Laudon traver ec10-ppt_ch03
Laudon traver ec10-ppt_ch03
 
Laudon traver ec10-ppt_ch03
Laudon traver ec10-ppt_ch03Laudon traver ec10-ppt_ch03
Laudon traver ec10-ppt_ch03
 
Computer 3
Computer 3Computer 3
Computer 3
 

More from shanthishyam

C&NS_FIREWALLS.ppt
C&NS_FIREWALLS.pptC&NS_FIREWALLS.ppt
C&NS_FIREWALLS.ppt
shanthishyam
 
Cryptography and Network Security_Chapter 1.ppt
Cryptography and Network Security_Chapter 1.pptCryptography and Network Security_Chapter 1.ppt
Cryptography and Network Security_Chapter 1.ppt
shanthishyam
 
TOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptTOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.ppt
shanthishyam
 
SINGLE SOURCE SHORTEST PATH.ppt
SINGLE SOURCE SHORTEST PATH.pptSINGLE SOURCE SHORTEST PATH.ppt
SINGLE SOURCE SHORTEST PATH.ppt
shanthishyam
 
FDS- Basic Concepts.ppt
FDS- Basic Concepts.pptFDS- Basic Concepts.ppt
FDS- Basic Concepts.ppt
shanthishyam
 
Three dimensional geometric transformations
Three dimensional geometric transformationsThree dimensional geometric transformations
Three dimensional geometric transformations
shanthishyam
 
OSI reference model
OSI reference modelOSI reference model
OSI reference model
shanthishyam
 
Database concepts
Database conceptsDatabase concepts
Database concepts
shanthishyam
 
Curve modeling
Curve modelingCurve modeling
Curve modeling
shanthishyam
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
shanthishyam
 

More from shanthishyam (10)

C&NS_FIREWALLS.ppt
C&NS_FIREWALLS.pptC&NS_FIREWALLS.ppt
C&NS_FIREWALLS.ppt
 
Cryptography and Network Security_Chapter 1.ppt
Cryptography and Network Security_Chapter 1.pptCryptography and Network Security_Chapter 1.ppt
Cryptography and Network Security_Chapter 1.ppt
 
TOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptTOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.ppt
 
SINGLE SOURCE SHORTEST PATH.ppt
SINGLE SOURCE SHORTEST PATH.pptSINGLE SOURCE SHORTEST PATH.ppt
SINGLE SOURCE SHORTEST PATH.ppt
 
FDS- Basic Concepts.ppt
FDS- Basic Concepts.pptFDS- Basic Concepts.ppt
FDS- Basic Concepts.ppt
 
Three dimensional geometric transformations
Three dimensional geometric transformationsThree dimensional geometric transformations
Three dimensional geometric transformations
 
OSI reference model
OSI reference modelOSI reference model
OSI reference model
 
Database concepts
Database conceptsDatabase concepts
Database concepts
 
Curve modeling
Curve modelingCurve modeling
Curve modeling
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 

Recently uploaded

Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
ArianaBusciglio
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 

Recently uploaded (20)

Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 

Computer networks

  • 1. Mrs.R.Shanthi Prabha M.Sc., M.Phil., Assistant Professor, DEPARTMENT OF CS
  • 2. • Business Applications • Home Applications • Mobile Users • Social Issues Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
  • 3.  Resource Sharing  Common Printer  Backup Systems,  VPN (Virtual Private Networks)  Ending the limitation of geographic disperse working environments.  Client - Server
  • 4. A network with two clients and one server Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
  • 5.  Client-Server Model  Data Sharing  Web Application  Personal Information Sharing  Email  VoIP  Video  Tele-Conferencing  Desktop Sharing  Telemedicine  e-commerce  Shopping from home
  • 6. The client-server model involves requests and replies Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
  • 7.  Ken Olsen, 1977 President,  Digital Equipment Corporation (DEC), Second Largest Computer Company (after IBM) said  “There is no reason for any individual to have a computer in his home”  Single Biggest Reason for purchasing a home computer is Internet.  Surfing the web is done for variety of reasons:  Arts, Business, Cooking, Government, Health, History, Hobbies, Recreation, Science, Sports, Travel, …  Newspaper, online Digital Libraries,  Client-Server Access vs Peer-to-Peer Communication.
  • 8. In a peer-to-peer system there are no fixed clients and servers. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
  • 9.  Peer-to-Peer Applications  BitTorrent  Sharing Music and Videos (Napster)  Email, etc.  Applications that involve interaction between  a person and a remote database  Person-to-person communication
  • 10.  Person – to – Person Communication  Audi + Video (Smell may take a while!)  Instant Messaging (Twitter)  Online Audio (Radio Channels)  Online Video (YouTube)  Telelearning  Social Networking:  Facebook  Wiki – Wikipedia  Home Shopping  Finances  Online auctions (eBay)
  • 11. Some forms of e-commerce Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
  • 12.  Entertainment:  MP3 and DVD-quality movies  TV shows – IPTV (IP TeleVision)  Interactive Live TV  Game Playing  Multiperson real-time simulation games.  Ubiquitous Computing  Smart Home Monitoring  RDIF (Radio Frequency Identification)  Replacing Bar Codes with a smart deivices that my turn the real world inot the Internet of things.
  • 13.  Mobile computers (handheld and laptops)  Fastest growing segments in computer history.  Individuals are able to use their mobile devices to:  Read and send email,  Tweet,  Watch Movies,  Download Music,  Play Games,  Serf the Web  Internet connectivity allows for those applications to be easily built  Wireless Networks (Cars, Boats, and Airplanes can not have wired Connections)  Cellular Networks  Wireless hotspots (802.11 Standard).  Wireless Networking vs. Mobile Wireless Networks Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
  • 14. Combinations of wireless networks and mobile computing Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
  • 15.  Smart Phones – Integration of Internet with Telephony  Driving the wireless-mobile applications  3G & 4G cellular networks provides fast data services  GPS is a standard feature  m-commerce (mobile commerce)  NFC (Near Field Communication) smart phones act as an DFID smartcard and interact with nearby reader for payment.  Sensor Networks  Notes that Sense/gather data about state of the physical world.  It is revolutionizing science  Wearable Computers  Implantable Devices  Pacemakers, Insulin pumps, …  Controllable wirelessly Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
  • 16. • Network neutrality • Digital Millennium Copyright Act • Profiling users • Phishing Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
  • 17.  Communications are not to be differentiated by their  content, or  source, or  who is providing the content
  • 18.  Warning messages to the operators and the users who are suspect of infringing copyrights.
  • 19.  Computer Networks make it very easy to communicate.  They also make it easy for the people who run the network to snoop on the traffic.  Sets up a conflict over issues such as employee rights vs. employer rights.  Government vs. Citizens rights.  Companies collect data to Profile users.
  • 20.  e-mail messages that masquerade as originating from a trustworthy party.  This is illegal activity.  Encryption, technology that is already developed, can solve the problem if not makes it significantly harder to commit activities that are illegal.
  • 21. • Personal area networks • Local area networks • Metropolitan area networks • Wide area networks • The internet Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
  • 23.  Two types of transmission technologies:  Broadcast  Communication channel shared by all machines  Packets send by any machine are received by all the others.  An address field within each packed specifies the intended recipient.  If packed is intended for some other machine, it is just ignored  If packed is indented for the recipient machine then it is processed.  Wireless network is a common example of a broadcast link  Communication is shared over a coverage region that depends on the wireless channel and the transmitting machine.  Broadcast systems usually also allow the possibility of addressing a packet to all destinations.  Point-to-point  Connect individual pairs of machines  Packets (short messages) may have to visit one or more intermediates machines.  Multiple routes of different lengths are possible.  Finding good ones is important.  Unicasting – transmission with exactly one sender and exactly one receiver.
  • 24.  Alternative Criteria: Scale  Distance is important as a classification metric because different technologies are used at different scales.
  • 25. Classification of interconnected processors by scale. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
  • 26. Bluetooth PAN (Personal Area Network) configuration Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
  • 27. Wireless and wired LANs. (a) IEEE 802.11 or WiFi. (b) Switched Ethernet (802.3). Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
  • 28.  Switched Ethernet  Switch; Hardware that connects two devices point-to-point  A Switch has multiple ports  Physical vs. Virtual LAN – VLAN  Dynamic vs. Static Channel Allocation  Static Allocation: Each device is allocated its time slot weather or not it uses it.  Dynamic methods allow changing the time allocation scheme.  Dynamic Allocation  Centralized  Decentralized
  • 29. A metropolitan area network based on cable TV. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
  • 30. WAN that connects three branch offices in Australia Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
  • 31. WAN using a virtual private network. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
  • 32. WAN using an ISP network. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011