Types of Networks
There are several different types of computer networks. Computer networks can be characterized by their size as well as their purpose.
The size of a network can be expressed by the geographic area they occupy and the number of computers that are part of the network. Networks can cover anything from a handful of devices within a single room to millions of devices spread across the entire globe.
Some of the different networks based on size are:
Personal area network, or PAN
Local area network, or LAN
Metropolitan area network, or MAN
Wide area network, or WAN
This pesentation explains some topics realated to the computer networking...
Basically we are covering the following areas...
1. Ethernet Technology and its Evolution
2. Wireless Networking Technologies
3. IPv4 and IPv6 Coexistence
This will help the students to get a good idea about Computer Networking field...
This pesentation explains some topics realated to the computer networking...
Basically we are covering the following areas...
1. Ethernet Technology and its Evolution
2. Wireless Networking Technologies
3. IPv4 and IPv6 Coexistence
This will help the students to get a good idea about Computer Networking field...
A computer network is defined as the interconnection of two or more computers. It is done to enable the computers to communicate and share available resources.
Components of computer network
Network benefits
Disadvantages of computer network
Classification by their geographical area
Network classification by their component role
Types of servers
What is a network?
Need for networking
Components of Network
Types of Network
Evolution of Networking
Communication media
Data Communication Terminologies
Switching Techniques
Digital and Analog Transmission
Network Topology
Network Devices
Communication Protocols
Wireless/Mobile Computing
One way to categorize the different types of computer network designs is by their scope or scale. For historical reasons, the networking industry refers to nearly every type of design as some kind of area network. Common types of area networks are:
LAN - Local Area Network
WAN - Wide Area Network
WLAN - Wireless Local Area Network
MAN - Metropolitan Area Network
SAN - Storage Area Network, System Area Network, Server Area Network, or sometimes Small Area Network
CAN - Campus Area Network, Controller Area Network, or sometimes Cluster Area Network
PAN - Personal Area Network
LAN and WAN are the two primary and best-known categories of area networks, while the others have emerged with technology advances
Basic definition of computer Network which will brief about types of networks, topology and difference between OSI and TCP/IP.It also elaborate to guided and Unguided media.
A computer network is defined as the interconnection of two or more computers. It is done to enable the computers to communicate and share available resources.
Components of computer network
Network benefits
Disadvantages of computer network
Classification by their geographical area
Network classification by their component role
Types of servers
What is a network?
Need for networking
Components of Network
Types of Network
Evolution of Networking
Communication media
Data Communication Terminologies
Switching Techniques
Digital and Analog Transmission
Network Topology
Network Devices
Communication Protocols
Wireless/Mobile Computing
One way to categorize the different types of computer network designs is by their scope or scale. For historical reasons, the networking industry refers to nearly every type of design as some kind of area network. Common types of area networks are:
LAN - Local Area Network
WAN - Wide Area Network
WLAN - Wireless Local Area Network
MAN - Metropolitan Area Network
SAN - Storage Area Network, System Area Network, Server Area Network, or sometimes Small Area Network
CAN - Campus Area Network, Controller Area Network, or sometimes Cluster Area Network
PAN - Personal Area Network
LAN and WAN are the two primary and best-known categories of area networks, while the others have emerged with technology advances
Basic definition of computer Network which will brief about types of networks, topology and difference between OSI and TCP/IP.It also elaborate to guided and Unguided media.
Course Code: CS-301
Course Title: Introduction to Computing.
Degree: BS (SE, CS, BIO)
Contents of this chapter:
Basic information about computer networks, types of computer networks. Other contents include:
1. List four major benefits of connecting computers to form a network.
2. Define the terms LAN, WAN, and MAN.
3. List the three types of networks.
4. Name the three physical topologies used to build networks.
Learning Outcomes
A Network of Networks
Internet
Define Computer Networks
Define Communication
State Importance of Computer network and communication
Network classification
Types of networks
Comparison of different networks
TCP/IP
Hypertext Transfer Protocol
Internet
A network formed by the co-operative interconnection of a large no. of computer networks.
Since Internet is formed by the interconnection of no. of networks, sometimes its also called as network of networks
1. What are the differences between a DBMS and RDBMS?
2. Explain the terms database and DBMS. Also, mention the different types of DBMS.
3. What are the advantages of DBMS?
4. Mention the different languages present in DBMS
5. What do you understand by query optimization?
6. Do we consider NULL values the same as that of blank space or zero?
7. What do you understand by aggregation and atomicity?
8. What are the different levels of abstraction in the DBMS?
9. What is an entity-relationship model?
10. What do you understand by the terms Entity, Entity Type, and Entity Set in DBMS?
11. What are relationships and mention different types of relationships in the DBMS
12. What is concurrency control?
13. What are the ACID properties in DBMS?
14. What is normalization and what are the different types of normalization?
15. What are the different types of keys in the database?
16. What do you understand by correlated subqueries in DBMS?
17. Explain Database partitioning and its importance.
18. What do you understand by functional dependency and transitive dependency in DBMS?
19. What is the difference between two and three-tier architectures?
20. Mention the differences between Unique Key and Primary Key
21. What is a checkpoint in DBMS and when does it occur?
22. Mention the differences between Trigger and Stored Procedures
23. What are the differences between Hash join, Merge join and Nested loops?
24. What do you understand by Proactive, Retroactive and Simultaneous Update?
25. What are indexes? Mention the differences between the clustered and non-clustered index
26. What do you understand by intension and extension?
27. What do you understand by cursor? Mention the different types of cursor A cursor is a database object which helps in manipulating data, row by row and represents a result set.
28. Explain the terms specialization and generalization
29. What do you understand by Data Independence?
30. What are the different integrity rules present in the DBMS?
31. What does Fill Factor concept mean with respect to indexes?
32. What is Index hunting and how does it help in improving query performance?
33. What are the differences between network and hierarchical database model?
34. Explain what is a deadlock and mention how it can be resolved?
35. What are the differences between an exclusive lock and a shared lock?
=>Concept of Governance
=>Risk and Control (GRC) as applicable to IT operational risk
=>Importance of documentation
=>DATA FLOW DIAGRAM for every application
=>Review of changes in the Data flow, reporting, etc.
=>Parameters for review
=>Importance of review on SLA compliance
=>Reporting to IT Strategy committee, Board etc.
Importance of Data - Where to find it, how to store, manipulate, and characterize it
Artificial Intelligence (AI)- Introduction to AI & ML Technologies/ Applications
Machine Learning (ML), Basic Machine Learning algorithms.
Applications of AI & ML in Marketing, Sales, Finance, Operations, Supply Chain
& Human Resources Data Governance
Legal and Ethical Issues
Robotic Process Automation (RPA)
Internet of Things (IoT)
Cloud Computing
What is Data ?
What is Information?
Data Models, Schema and Instances
Components of Database System
What is DBMS ?
Database Languages
Applications of DBMS
Introduction to Databases
Fundamentals of Data Modeling and Database Design
Database Normalization
Types of keys in database management system
Distributed Database
CASE (COMPUTER AIDED SOFTWARE ENGINEERING)
CASE and its Scope
CASE support in software life cycle documentation
project management
Internal Interface
Reverse Software Engineering
Architecture of CASE environment.
SOFTWARE RELIABILITY AND QUALITY ASSURANCE
Reliability issues
Reliability metrics
Reliability growth modeling
Software quality
ISO 9000 certification for software industry
SEI capability maturity model
comparison between ISO and SEI CMM
Software Testing
Different Types of Software Testing
Verification
Validation
Unit Testing
Beta Testing
Alpha Testing
Black Box Testing
White Box testing
Error
Bug
Software Design
Design principles
Problem partitioning
Abstraction
Top down and bottom up-design
Structured approach
Functional versus object oriented approach
Design specifications and verification
Monitoring and control
Cohesiveness
Coupling
Fourth generation techniques
Functional independence
Software Architecture
Transaction and Transform Mapping
SDLC
PDLC
Software Development Life Cycle
Program Development Life Cycle
Iterative model
Advantages of Iterative model
Disadvantages of Iterative model
When to use iterative model
Spiral Model
Advantages of Spiral model
Disadvantages of Spiral model
When to use Spiral model
Role of Management in Software Development
Software Lifecycle Models / Software Development Models
Types of Software development models
Waterfall Model
Features of Waterfall Model
Phase of Waterfall Model
Prototype Model
Advantages of Prototype Model
Disadvantages of Prototype model
V Model
Advantages of V-model
Disadvantages of V-model
When to use the V-model
Incremental Model
ITERATIVE AND INCREMENTAL DEVELOPMENT
INCREMENTAL MODEL LIFE CYCLE
When to use the Incremental model
Rapid Application Development RAD Model
phases in the rapid application development (RAD) model
Advantages of the RAD model
Disadvantages of RAD model
When to use RAD model
Agile Model
Advantages of Agile model
Disadvantages of Agile model
When to use Agile model
Introduction to software engineering
Software products
Why Software is Important?
Software costs
Features of Software?
Software Applications
Software—New Categories
Software Engineering
Importance of Software Engineering
Essential attributes / Characteristics of good software
Software Components
Software Process
Five Activities of a Generic Process framework
Relative Costs of Fixing Software Faults
Software Qualities
Software crisis
Software Development Stages/SDLC
What is Software Verification
Advantages of Software Verification
Advantages of Validation
Cloud Computing
Categories of Cloud Computing
SaaS
PaaS
IaaS
Threads of Cloud Computing
Insurance Challenges
Cloud Solutions
Security of the Insurance Industry
Cloud Solutions
Insurance Security in the Insurance Industry with respect to Indian market
Application Software
Applications Software
Software Types
Task-Oriented Productivity Software
Business Software
Application Software and Ethics
Computers and People
Software:
Systems and Application Software
Identify and briefly describe the functions of the two basic kinds of software
Outline the role of the operating system and identify the features of several popular operating systems
Discuss how application software can support personal, workgroup, and enterprise business objectives
Identify three basic approaches to developing application software and discuss the pros and cons of each
Outline the overall evolution and importance of programming languages and clearly differentiate among the generations of programming languages
Identify several key software issues and trends that have an impact on organizations and individuals
Programming Languages
A formal language for describing computation?
A “user interface” to a computer?
Syntax + semantics?
Compiler, or interpreter, or translator?
A tool to support a programming paradigm?
Number Codes and Registers
2’s complement numbers
Addition and subtraction
Binary coded decimal
Gray codes for binary numbers
ASCII characters
Moving towards hardware
Storing data
Processing data
More from Amity University | FMS - DU | IMT | Stratford University | KKMI International Institute | AIMA | DTU (20)
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
2. Types of NetworksTypes of Networks
Computer networkComputer network is a system that connectsis a system that connects
computers via communications media so thatcomputers via communications media so that
data can be transmitted among them.data can be transmitted among them.
Local area network (LAN)Local area network (LAN) connects two orconnects two or
more devices in a limited geographical region.more devices in a limited geographical region.
3. Local Area Network (LAN)Local Area Network (LAN)
LANLAN consists of the following components:consists of the following components:
LAN file serverLAN file server is a repository of variousis a repository of various
software and data files for the network.software and data files for the network.
NodesNodes are the client machines on the LAN.are the client machines on the LAN.
Wired or wirelessWired or wireless communicationcommunication media thatmedia that
connects the devices.connects the devices.
4. Local Area Network (Continued)Local Area Network (Continued)
LAN network interface cardLAN network interface card (NIC)(NIC) is a specialis a special
adapter that links an individual device to theadapter that links an individual device to the
communication medium and specifies:communication medium and specifies:
The rate of data transmission;The rate of data transmission;
The size of the message units;The size of the message units;
Addressing information attached to each message;Addressing information attached to each message;
The network topology.The network topology.
Network operating systemNetwork operating system (NOS)(NOS) manages themanages the
server and routes and manages communications onserver and routes and manages communications on
the network.the network.
5. Network TopologiesNetwork Topologies
StarStar, all network nodes connect to a, all network nodes connect to a singlesingle
computercomputer, typically the file server., typically the file server.
BusBus, all network nodes connect to the, all network nodes connect to the bus,bus,
which is a single communications channel,which is a single communications channel,
such as twisted pair, coaxial cable, or fibersuch as twisted pair, coaxial cable, or fiber
optic cable.optic cable.
RingRing, network nodes are connected to adjacent, network nodes are connected to adjacent
nodes to form a closed loop.nodes to form a closed loop.
6. Wide Area Network (WAN)Wide Area Network (WAN)
Wide area networks (Wide area networks (WANWANs)s) are networks thatare networks that
cover large geographic areas.cover large geographic areas.
WANs typically connect multiple LANs.WANs typically connect multiple LANs.
WANs have large capacity and combine multiple channelsWANs have large capacity and combine multiple channels
(fiber optic, satellite, microwave, etc.).(fiber optic, satellite, microwave, etc.).
WANs provided by common carriers, such as telephoneWANs provided by common carriers, such as telephone
companies (Sprint, AT&T, etc.).companies (Sprint, AT&T, etc.).
Value-added network (Value-added network (VANVAN)) are private, data-onlyare private, data-only
networks managed by outside third-parties thatnetworks managed by outside third-parties that
provide these networks to multiple organizations.provide these networks to multiple organizations.
7. Computer NetworkComputer Network
Computer network:Computer network:
Two or more computers that are connected by some type ofTwo or more computers that are connected by some type of
communication mediacommunication media to enableto enable resource exchange / sharingresource exchange / sharing
andand communicationcommunication
Communication media:Communication media:
Wire (cable)Wire (cable)
Wireless (wave)Wireless (wave)
Resource:Resource:
File (e.g.,File (e.g., Web pagesWeb pages))
PrinterPrinter
8. Client and ServerClient and Server
Servers:Servers:
Computers thatComputers that provide networking servicesprovide networking services (e.g., sharing files,(e.g., sharing files,
sharing Web pages) to other computerssharing Web pages) to other computers
Clients:Clients:
Computers thatComputers that access/request and receive networking servicesaccess/request and receive networking services
from serversfrom servers
9. Client/Server NetworkClient/Server Network
Client/Server Network:Client/Server Network:
A network where some of the computers are clients, some otherA network where some of the computers are clients, some other
are servers, and some others are both clients and serversare servers, and some others are both clients and servers
A computer can be BOTH client and serverA computer can be BOTH client and server
This computer can provides services to other computers as well asThis computer can provides services to other computers as well as
accesses/requests and receives services from serversaccesses/requests and receives services from servers
11. Networking ComponentsNetworking Components
Major elements of a network:Major elements of a network:
ComputersComputers
CPU, main memory, I/O devices, secondary memoryCPU, main memory, I/O devices, secondary memory
Network Interface Card (NIC)Network Interface Card (NIC)
A hardware to enable one computer to communicate with anotherA hardware to enable one computer to communicate with another
computer(s) over a computer networkcomputer(s) over a computer network
Networking program/software (e.g., Client software,Networking program/software (e.g., Client software,
Server software)Server software)
A software that must be installed in a computer to enable resourceA software that must be installed in a computer to enable resource
exchange with other computersexchange with other computers
HubHub
A hardware that is used to connect three or more computers easilyA hardware that is used to connect three or more computers easily
12. Networking ComponentsNetworking Components
Major elements of a network:Major elements of a network:
ComputersComputers
Classes of computers based on performanceClasses of computers based on performance
(information processing speed and data storage(information processing speed and data storage
capacity):capacity):
Micro ComputerMicro Computer: Desktop, Laptop: Desktop, Laptop
Mini / Mid-Range computerMini / Mid-Range computer: Mainframe Computers: Mainframe Computers
Super-ComputerSuper-Computer
13. Networking ComponentsNetworking Components
Major elements of a network:Major elements of a network:
ComputersComputers
Micro-computer (e.g.,
desktop computer)
Mini-computer (e.g.,
mainframe computer)
18. Networking SoftwareNetworking Software
Software / ProgramSoftware / Program that must be run in every computer inthat must be run in every computer in
a network so that these computers can exchange resourcesa network so that these computers can exchange resources
Server Program:Server Program: program that must be run in a computerprogram that must be run in a computer
so that this computer canso that this computer can give/providegive/provide networking servicesnetworking services
to other computer's in the network.to other computer's in the network.
Client program:Client program: program that must be run in a computer soprogram that must be run in a computer so
that this computer canthat this computer can request and receive networkingrequest and receive networking
servicesservices from server.from server.
A computer can run both server and client program at theA computer can run both server and client program at the
same time, and therefore, become both server and client atsame time, and therefore, become both server and client at
the same timethe same time
21. HubHub
Electronic device that enables the connection of three orElectronic device that enables the connection of three or
more computers (computing devices)more computers (computing devices)
The original hub broadcasts signal from one port to all otherThe original hub broadcasts signal from one port to all other
ports in the hubports in the hub
Hub has been integrated withHub has been integrated with switchswitch: electronic device that: electronic device that
can forward signal from one port to the port that iscan forward signal from one port to the port that is
connected to the actual destination of the signalconnected to the actual destination of the signal
Hub has been integrated withHub has been integrated with routerrouter: electronic device that: electronic device that
can accept signal from one port, determine the best route tocan accept signal from one port, determine the best route to
the destination, and forward the signal to the port connectedthe destination, and forward the signal to the port connected
to the routeto the route
24. RouterRouter
path A
path B
Router Router
Router
Computer A Computer B
For
Computer
B
Router is especially useful to be
used in a network that has
redundant paths (i.e., two
nodes are connected by more
than one path)
26. InternetworkInternetwork
A group of networks that are connected to one another toA group of networks that are connected to one another to
enable data exchange.enable data exchange.
An example of an internetwork is theAn example of an internetwork is the InternetInternet
A single network usually consists of a network that isA single network usually consists of a network that is
owned byowned by a single organizationa single organization (e.g., Airtel network), while(e.g., Airtel network), while
an internetwork usually consists ofan internetwork usually consists of two or more networks,two or more networks,
each is owned by different organizationeach is owned by different organization (e.g., the Internet(e.g., the Internet
consists of Airtel network, Alabama A&M network,consists of Airtel network, Alabama A&M network,
Harvard University network, Ford Motor CompanyHarvard University network, Ford Motor Company
network, AT&T network, MCI/Worldcom network, etc.)network, AT&T network, MCI/Worldcom network, etc.)
28. Internetworking componentInternetworking component
Router:Router:
Electronic device to accept signal from one port, determineElectronic device to accept signal from one port, determine
the best route to the destination, and forward the signal to thethe best route to the destination, and forward the signal to the
port connected to the routeport connected to the route
Electronic device to connect different networks (i.e.,Electronic device to connect different networks (i.e.,
networks using different network technologies e.g., Ethernetnetworks using different network technologies e.g., Ethernet
network and PSTN)network and PSTN)
The major benefits of Router:The major benefits of Router:
To improve the efficiency of the internetworkTo improve the efficiency of the internetwork
The internetwork always uses the “best available path” toThe internetwork always uses the “best available path” to
transmit signaltransmit signal
To improve the reliability of the internetworkTo improve the reliability of the internetwork
The internetwork still works although some paths areThe internetwork still works although some paths are
completely brokencompletely broken
To connect different networksTo connect different networks
29. The Internet ProtocolThe Internet Protocol
Protocol:Protocol:
Standard set of rules that allow computers to communicateStandard set of rules that allow computers to communicate
(exchange data)(exchange data)
To be able to communicate, computers must use the sameTo be able to communicate, computers must use the same
protocolprotocol
ProtocolProtocol ≈≈ LanguageLanguage
Protocol(s) is used to develop networking program (e.g.,Protocol(s) is used to develop networking program (e.g.,
server program and client program) and to build networkingserver program and client program) and to build networking
hardware (e.g., NIC)hardware (e.g., NIC)
If two computers want to exchange information, they have toIf two computers want to exchange information, they have to
run programs/software and to use hardware that are based onrun programs/software and to use hardware that are based on
the same protocolthe same protocol
The Internet uses a protocol that is called TCP/IPThe Internet uses a protocol that is called TCP/IP
(Transmission Control Protocol/Internet Protocol)(Transmission Control Protocol/Internet Protocol)
30. TCP/IP ProtocolTCP/IP Protocol
In a TCP/IP network, every computer is given aIn a TCP/IP network, every computer is given a
unique identification number that is called IPunique identification number that is called IP
addressaddress
IP address is used to determineIP address is used to determine
Which computer wants to communicate with whichWhich computer wants to communicate with which
computercomputer
The WWW network uses the Internet. And therefore, youThe WWW network uses the Internet. And therefore, you
can use IP address to communicate with other computercan use IP address to communicate with other computer
in the WWWin the WWW
Example: Open your Web browser > Type:Example: Open your Web browser > Type:
64.236.16.20/index.html64.236.16.20/index.html
31. IP address and the InternetIP address and the Internet
IP address consists of four groups of decimalIP address consists of four groups of decimal
numbers (each group ranges from 0 to 255)numbers (each group ranges from 0 to 255)
How to find the IP address of your computer?How to find the IP address of your computer?
Open the Command Prompt program > Type ipconfig/allOpen the Command Prompt program > Type ipconfig/all
32. WAN TechnologiesWAN Technologies
Dial-up modem connectionsDial-up modem connections
CheapCheap
SlowSlow
A phone line, a modem at each endA phone line, a modem at each end
Integrated Services Digital network (ISDN)Integrated Services Digital network (ISDN)
Higher costHigher cost
FasterFaster
A special phone lineA special phone line
33. WAN TechnologiesWAN Technologies
Interface standardsInterface standards
Basic Rate Interface (BRI)Basic Rate Interface (BRI)
Uses three separate channelsUses three separate channels
Two bearer channels of 64Kbps carrying the voice/dataTwo bearer channels of 64Kbps carrying the voice/data
A delta channel of 16Kbps for signalingA delta channel of 16Kbps for signaling
Primary Rate Interface (PRI)Primary Rate Interface (PRI)
Uses 23 bearer channels of 64kbps for data/voiceUses 23 bearer channels of 64kbps for data/voice
Uses one 64kbps delta channel for singalingUses one 64kbps delta channel for singaling
T-carrier linesT-carrier lines
High-speed linesHigh-speed lines
Can be leased from telephone companiesCan be leased from telephone companies
Are often used to create private networksAre often used to create private networks
34. WAN TechnologiesWAN Technologies
Four typesFour types
T1T1
Offers speed of 1.544MbpsOffers speed of 1.544Mbps
Connects LANSConnects LANS
T2T2
Offers speed of 6.312MbpsOffers speed of 6.312Mbps
Uses 96 64Kbps B channelsUses 96 64Kbps B channels
T3T3
Offers speed of 44.736MbpsOffers speed of 44.736Mbps
Uses 672 64Kbps B channelsUses 672 64Kbps B channels
T4T4
Offers speed of 274.176MbpsOffers speed of 274.176Mbps
Uses 4,032 64Kbps B channelsUses 4,032 64Kbps B channels
35. WAN TechnologiesWAN Technologies
Fiber Distributed Data Interface (FDDI)Fiber Distributed Data Interface (FDDI)
Uses fiber-optic cableUses fiber-optic cable
Uses token-passing media accessUses token-passing media access
Dual-ring for redundancy and fault toleranceDual-ring for redundancy and fault tolerance
Reaches 100Mbps at distance of two kilometersReaches 100Mbps at distance of two kilometers
Asynchronous transfer Mode (ATM)Asynchronous transfer Mode (ATM)
Packet-switching technologyPacket-switching technology
Use fixed-length packets of 53bytesUse fixed-length packets of 53bytes
Provides speeds from 1.544Mbps to 622MbpsProvides speeds from 1.544Mbps to 622Mbps
Circuit-based network technologyCircuit-based network technology
Switched virtual circuits (SVCs)Switched virtual circuits (SVCs)
Permanent virtual circuits (PVCs0Permanent virtual circuits (PVCs0
36. WAN TechnologiesWAN Technologies
X.25X.25
Packet-switchingPacket-switching
Only 56KbpsOnly 56Kbps
Frame relayFrame relay
Packet-switching technologyPacket-switching technology
Uses variable-length packetsUses variable-length packets
Offers speeds starting at 56kbpsOffers speeds starting at 56kbps
SONET/OC-x levelsSONET/OC-x levels
Bell Communication Research developed SONETBell Communication Research developed SONET
Optical Carrier (OC) levelsOptical Carrier (OC) levels
OC-1OC-1 51.84Mbps51.84Mbps
OC-3OC-3 155.52Mbps155.52Mbps
OC-12OC-12 622.08Mbps622.08Mbps
OC-24OC-24 1.244Gbps1.244Gbps
OC-48OC-48 2.488Gbps2.488Gbps
OC-192OC-192 9.953Gbps9.953Gbps
44. Application LayerApplication Layer
Word Processing
Spreadsheet
Database
Design/Manufacturing
Project Planning
Others
Electronic Mail
File Transfer
Remote Access
Client/Server Process
Network Management
Others
Electronic Data Interchange
World Wide Web
E-Mail Gateways
Special-Interest Bulletin Boards
Financial Transaction Services
Internet Navigation Utilities
Conferencing (Video, Voice, Data)
Others
Internetwork application can
extend beyond the enterprise
45. Presentation LayerPresentation Layer
• Text
• Data
ASCII
EBCDIC
Encrypted
• Graphics
• Visual Images
PICT
TIFF
JPEG
GIF• Sound
• Video
MIDI
MPEG
Quick Time
Provides code formatting and conversion for applications
46. Session LayerSession Layer
Network File System (NFS)
Structured Query Language (SQL)
Remote-Procedure Call (RPC)
X Window System
AppleTalk Session Protocol (ASP)
DNA Session Control Protocol (SCP)
Service Request
Service Reply
Coordinates applications as they interact on different hosts
48. Transport LayerTransport Layer
Segments upper-layer applicationsSegments upper-layer applications
Establishes an end-to-end connectionEstablishes an end-to-end connection
Sends segments from one end host to anotherSends segments from one end host to another
Optionally, ensures data reliabilityOptionally, ensures data reliability
51. Sends Segments with FlowSends Segments with Flow
ControlControl
Buffer Full
Process
Segments
Buffer OK
Stop
SENDER RECEIVER
Transmit
Not Ready
Ready
Resume Transmission
Go
54. Network Layer: PathNetwork Layer: Path
DeterminationDetermination
Layer 3 functions to find the best path through the
internetwork
Which Path?
55. Network Layer: CommunicateNetwork Layer: Communicate
PathPath
Addresses represent the path of media connections
1
2
3
4
5
6
7
8
9
10
11
56. Addressing: Network and HostAddressing: Network and Host
• Network address - Path part used by the router
• Host address - Specific port or device on the network
1.1
2.1
3.1
1.2
1.3
Network Host
1 1
2
3
2 1
3 1
57. Routing Uses Network AddressesRouting Uses Network Addresses
• Network portion of address used to make path selections
• Node portion of address refers to router port to the path
Destination
Network
Direction and
Router Port
1.0
2.0
3.0
1.1
2.1
3.1
1.0
3.1
3.0
2.1
2.0
1.1
58. Network-Layer ProtocolNetwork-Layer Protocol
OperationsOperations
X Y
A
B
C
Application
Presentation
Session
Transport
Network
Data Link
Physical
X
Network
Data Link
Physical
Network
Data Link
Physical
Network
Data Link
Physical
Application
Presentation
Session
Transport
Network
Data Link
Physical
Y
A B C
Each router provides its services to support upper-layer
functions
60. Physical and Data-Link TypesPhysical and Data-Link Types
Data Link
(frames)
Physical
(bits,
signals,
clocking)
E
t
h
e
r
n
e
t
802.2 LLC
8
0
2
.
3
8
0
2
.
5
F
D
D
I
Dial
on
Demand
SDLC HDLC
X.25
Frame
Relay
ISDN
PPP
V.24
EIA/TIA-232 G.703
V.35
EIA/TIA-449 EIA-530
HSSI
LAN WAN
Separate physical and data link layers for LAN and WAN
61. LAN Data Link SublayersLAN Data Link Sublayers
Network
Data Link
Physical
LLC
MAC
Logical Link Control
Media Access Control
MAC Frame 802.2 LLC Packet or Datagram
• LLC refers upward to higher-layer software functions
• MAC refers downward to lower-layer hardware functions
63. MAC AddressMAC Address
Vendor Code Serial Number
0000.0c12.3456
ROM
RAM
MAC address is burned into ROM on a network interface card
24 bits 24 bits
64. Finding the MAC AddressFinding the MAC Address
Broadcast
Host Z
MAC ? Host Z
ARP Request
Host Y Host Z
Host Y
MAC
Host Z
MAC
ARP ReplyExample 1 : TCP/IP destination local
Broadcast
Host Z
MAC ? Host Z
ARP Request
Host Y
Host Z
Host Y
MAC
Router
MAC
ARP ReplyExample 2 : TCP/IP destination
not local
Router A
Routing
Table:
Net for
Host Z
• An example: TCP/IP Address Resolution Protocol (ARP)
• ARP finds the MAC address for a data-link connection
66. Physical Layer: WANPhysical Layer: WAN
DSU/CSU
EIA/TIA-232
V.35
X.21
HSSI
others
(Modem)
DTE
Data Terminal Equipment
End of the user’s device
on the WAN link
DCE
Data Circuit-Terminating
Equipment
End of the WAN provider’s
side of the communication facility
67. Data Link Layer: WANData Link Layer: WAN
ProtocolsProtocols
DSU/CSU
(Modem)
DSU/CSU
(Modem)
• SDLC - Synchronous Data Link Control
• HDLC - High-Level Data Link Control
• LAPB - Link Access Procedure Balanced
• Frame Relay - Simplified version of HDLC framing
• PPP - Point-to-point Protocol
• X.25 - Packet level protocol (PLP)
• ISDN - Integrated Services Digital Network (data-link signaling)
68. Dr. Kamal GulatiDr. Kamal Gulati
Associate Professor |Associate Professor |
University Quality Support Head |University Quality Support Head |
Mentoring Programme CoordinatorMentoring Programme Coordinator
[Ph. D., M.Sc. (Computer Science), M.C.A., M.B.A][Ph. D., M.Sc. (Computer Science), M.C.A., M.B.A]
Professional Certifications:Professional Certifications:
Certified Microsoft Innovative EducatorCertified Microsoft Innovative Educator
Data Science 101 Certification from Big Data UniversityData Science 101 Certification from Big Data University
R Language 101 Certification from Big Data UniversityR Language 101 Certification from Big Data University
SQL Certification from SOLOLEARN.comSQL Certification from SOLOLEARN.com
Certified IBM Big Data 101 from Big Data UniversityCertified IBM Big Data 101 from Big Data University
R Program & Python Certified from DataCampR Program & Python Certified from DataCamp
Wiley Certified Big Data Analyst [WCBDA]Wiley Certified Big Data Analyst [WCBDA]
Certification on DBMS from IIT MumbaiCertification on DBMS from IIT Mumbai
Certified Cisco Certified Network Associate [CCNA]Certified Cisco Certified Network Associate [CCNA]
Certified Microsoft Certified Professional [MCP]Certified Microsoft Certified Professional [MCP]
Certified Brainbench in Computer Fundamentals, Microsoft Access,Certified Brainbench in Computer Fundamentals, Microsoft Access, MySQL 5.7 AdministrationMySQL 5.7 Administration &&
Microsoft ProjectMicrosoft Project
69. • Worked asWorked as Visiting ProfessorVisiting Professor withwith Stratford UniversityStratford University,, USAUSA for six months fromfor six months from
Jan’2016 to June’2016.Jan’2016 to June’2016.
• Also worked atAlso worked at Bahrain University in Kingdom of BahrainBahrain University in Kingdom of Bahrain Sr. I.T. Faculty (ComputerSr. I.T. Faculty (Computer
Science Department) for Period of 2 Years.Science Department) for Period of 2 Years.
• Have rich experience in the field of teaching and research in Computer Science andHave rich experience in the field of teaching and research in Computer Science and
Information Technology for almostInformation Technology for almost 15+ years in Academia15+ years in Academia..
• Having experience of working with both private and public institutions and universitiesHaving experience of working with both private and public institutions and universities
as the lecturer andas the lecturer and self-instruction material writer for Information Technology coursesself-instruction material writer for Information Technology courses..
• Had number of research papers published in national and international journals andHad number of research papers published in national and international journals and
conference proceedings inconference proceedings in IEEE and Scopus IndexIEEE and Scopus Index..
• AlsoAlso chaired various National and International Conferences of repute and associatedchaired various National and International Conferences of repute and associated
with various International Journalswith various International Journals as Editorial Board Member for International andas Editorial Board Member for International and
National, Academic Adviser and Research Paper Reviewer.National, Academic Adviser and Research Paper Reviewer.
My current area of interestMy current area of interest: Big Data Analytics, R Software, Management Information: Big Data Analytics, R Software, Management Information
System, IT Project Management, Decision Support System, Business Analytics,System, IT Project Management, Decision Support System, Business Analytics,
Database Management System, Data Networking and Advanced Excel with VisualDatabase Management System, Data Networking and Advanced Excel with Visual
Basic Macros.Basic Macros.
Country VisitedCountry Visited: USA, Canada, UK, UAE, Bahrain, Oman (Mostly for Teaching and: USA, Canada, UK, UAE, Bahrain, Oman (Mostly for Teaching and
Research Purpose)Research Purpose)
Profile of Dr. Kamal Gulati
70. Technical Program Committee for International Conference on Data, Engineering and ApplicationsTechnical Program Committee for International Conference on Data, Engineering and Applications
2017 (IDEA-2k17) which would be on October 28-29, 2017 at Bhopal.2017 (IDEA-2k17) which would be on October 28-29, 2017 at Bhopal. http://www.ideaconference.inhttp://www.ideaconference.in
Advisory Board Committee Member for International Conference on Energy, Communication, DataAdvisory Board Committee Member for International Conference on Energy, Communication, Data
Analytics and Soft Computing (ICECDS) which would be on 1-2 August 2017 at SKR EngineeringAnalytics and Soft Computing (ICECDS) which would be on 1-2 August 2017 at SKR Engineering
College, Poonamallee, Tamil Nadu, India.College, Poonamallee, Tamil Nadu, India. http://ecds.org.inhttp://ecds.org.in
Advisory Committee Member for International Conference on Innovative Research in EngineeringAdvisory Committee Member for International Conference on Innovative Research in Engineering
and Science which would be on 16-17 June 2017 at Asian Institute of Technology Conference Centerand Science which would be on 16-17 June 2017 at Asian Institute of Technology Conference Center
Thailand.Thailand. http://www.iresconf.orghttp://www.iresconf.org
Advisory Committee Member for International Conference on Cloud Computing and Internet ofAdvisory Committee Member for International Conference on Cloud Computing and Internet of
everything which held on 10-11 Feb’2016 at Delhi-NCR.everything which held on 10-11 Feb’2016 at Delhi-NCR. http://www.ccioet.orghttp://www.ccioet.org
Technical Committee member for InCITe-2016 (International Conference on InformationTechnical Committee member for InCITe-2016 (International Conference on Information
Technology) Theme - Internet of Things: Connect Your Worlds, IT Summit, Amity University 2016Technology) Theme - Internet of Things: Connect Your Worlds, IT Summit, Amity University 2016
which held on 06-07 Oct, 2016.which held on 06-07 Oct, 2016. http://www.amity.edu/incite2016http://www.amity.edu/incite2016
Technical Speaker for Global perspective on IT business “The Changing Scenario” – Big Data onTechnical Speaker for Global perspective on IT business “The Changing Scenario” – Big Data on
International Students Conference New Delhi (ISCND) which held on 14-15 Oct, 2016International Students Conference New Delhi (ISCND) which held on 14-15 Oct, 2016
http://iscnd.comhttp://iscnd.com
Advisory Committee Member for International Conference on Sustainable Computing Techniques inAdvisory Committee Member for International Conference on Sustainable Computing Techniques in
Engineering, Science and Management which has held on 09-10 Sep’2016 at Delhi-NCR.Engineering, Science and Management which has held on 09-10 Sep’2016 at Delhi-NCR.
http://www.scesm.orghttp://www.scesm.org
Technical Program Committee Member for Program Committee Member for International ConferenceTechnical Program Committee Member for Program Committee Member for International Conference
on Recent Trends IN ICT, Jaipur, India, Aug 18-19, 2017on Recent Trends IN ICT, Jaipur, India, Aug 18-19, 2017 http://rtict.orghttp://rtict.org
Program Committee Member for International Conference on Recent Advancement in Computer andProgram Committee Member for International Conference on Recent Advancement in Computer and
Communication Bhopal, India, (IC-RAC-2017) May 26-27, 2017Communication Bhopal, India, (IC-RAC-2017) May 26-27, 2017 http://www.icrac.co.inhttp://www.icrac.co.in
Profile Contd….Profile Contd….
71. Editorial Board member for the following International Journals:Editorial Board member for the following International Journals:
International Journal of Computer Science and InnovationInternational Journal of Computer Science and Innovation
http://www.infinitysciences.orghttp://www.infinitysciences.org
International Journal of Latest Research in Engineering andInternational Journal of Latest Research in Engineering and
TechnologyTechnology http://www.ijlret.comhttp://www.ijlret.com
International Journal of Latest Trends in Engineering and TechnologyInternational Journal of Latest Trends in Engineering and Technology
http://www.ijltet.orghttp://www.ijltet.org
InternationalInternational JournalJournal ofof ApplicationApplication oror InnovationInnovation
inin EngineeringEngineering && ManagementManagement http://www.ijaiem.orghttp://www.ijaiem.org
International Journal for ManagementInternational Journal for Management http://www.ijm-apm.comhttp://www.ijm-apm.com
ITM International Journal of Innovations in Science, Engineering &ITM International Journal of Innovations in Science, Engineering &
ManagementManagement www.iijisem.orgwww.iijisem.org
The International Journal of Emerging Engineering and EmbeddedThe International Journal of Emerging Engineering and Embedded
SystemsSystems http://www.ijeees.orghttp://www.ijeees.org
Conference InfoConference Info http://conferenceinfo.org/tpc.phphttp://conferenceinfo.org/tpc.php
International Journal of Computer Engineering in Research TrendsInternational Journal of Computer Engineering in Research Trends
(IJCERT)(IJCERT) http://www.ijcert.orghttp://www.ijcert.org
Expert Speaker for Program “Insurance Beyond Doubt” Presented by Oriental Insurance Co Ltd.Expert Speaker for Program “Insurance Beyond Doubt” Presented by Oriental Insurance Co Ltd.
https://www.youtube.com/watch?v=GrvJkN_Zn3Qhttps://www.youtube.com/watch?v=GrvJkN_Zn3Q
Profile Contd….Profile Contd….
72. BOOK, CHAPTER, and CASE STUDY PublishedBOOK, CHAPTER, and CASE STUDY Published
Published Book on “A Study of Changing Trends in E-CRM ofPublished Book on “A Study of Changing Trends in E-CRM of
Indian Insurance Industry” Published by LAP LambertIndian Insurance Industry” Published by LAP Lambert
Academic Publishing, one of the top researchers and renownedAcademic Publishing, one of the top researchers and renowned
scientists of Germany with ISBN: 3330009543,scientists of Germany with ISBN: 3330009543,
9783330009547. The Book available at Amazon.com.9783330009547. The Book available at Amazon.com.
Published Real Case Study on “IoT Security Considerations forPublished Real Case Study on “IoT Security Considerations for
Higher Education” published on Business Cases - RENVOIHigher Education” published on Business Cases - RENVOI
2017 BOOK (The Case Centre, UK) with ISBN: 978-1-4828-2017 BOOK (The Case Centre, UK) with ISBN: 978-1-4828-
8840-9, Page 63-70. The Book available at the various online8840-9, Page 63-70. The Book available at the various online
website: Amazon, AbeBooks, Chegg, Barnes & Noble.website: Amazon, AbeBooks, Chegg, Barnes & Noble.
Published Chapter on "Role of eWorld in InsurancePublished Chapter on "Role of eWorld in Insurance
Innovation" Published by Insurance Institute of India (III), 60Innovation" Published by Insurance Institute of India (III), 60
Years Diamond Jubilee, Compendium, Nov 2016 – (Magazine)Years Diamond Jubilee, Compendium, Nov 2016 – (Magazine)
– One of the premium Insurance Institute of India.– One of the premium Insurance Institute of India.