SlideShare a Scribd company logo
TRINITY INSTITUTE OF PROFESSIONAL STUDIES
Sector – 9, Dwarka Institutional Area, New Delhi-75
Affiliated Institution of G.G.S.IP.U, Delhi
ADVANCED COMPUTER
NETWORK -20304
ACN
TRINITY INSTITUTE OF PROFESSIONAL STUDIES
Sector – 9, Dwarka Institutional Area, New Delhi-75
Affiliated Institution of G.G.S.IP.U, Delhi
Advanced computer network
ACN-20304
TRINITY INSTITUTE OF PROFESSIONAL STUDIES
Sector – 9, Dwarka Institutional Area, New Delhi-75
Network
• A network is a connected collection of devices
and end systems, such as computers and servers,
that can communicate with each other.
• Networks carry data in many types of
environments, including homes, small businesses,
and large enterprises. In a large enterprise, a
number of locations might need to communicate
with each other, and you can describe those
locations as follows
TRINITY INSTITUTE OF PROFESSIONAL STUDIES
Sector – 9, Dwarka Institutional Area, New Delhi-75
Locations
• Main office:
• Remote locations
• Branch offices:
• Home offices:
• Mobile users
TRINITY INSTITUTE OF PROFESSIONAL STUDIES
Sector – 9, Dwarka Institutional Area, New Delhi-75
Resource-Sharing Functions and
Benefits
• The main functions of computer networks in
business today are to simplify and streamline
business processes through the use of data and
application sharing. Networks enable end users
to share both information and hardware
resources. By providing this interconnection
between the users and common sets of data,
businesses can make more efficient use of their
resources. The major resources that are shared in
a computer network include the following:
TRINITY INSTITUTE OF PROFESSIONAL STUDIES
Sector – 9, Dwarka Institutional Area, New Delhi-75
Resource sharing
• Data and applications: When users are connected through a network,
they can share files and even software application programs, making data
more easily available and promoting more efficient collaboration on work
projects.
• Physical resources: The resources that can be shared include both input
devices, such as cameras, and output devices, such as printers.
• Network storage: Today the network makes storage available to users in
several ways. Direct attached storage (DAS) directly connects physical
storage to a PC or a shared server. Network attached storage (NAS) makes
storage available through a special network appliance. Finally, storage area
networks (SAN) provide a network of storage devices.
• Backup devices: A network can also include backup devices, such as tape
drives, that provide a central means to save files from multiple computers.
Network storage is also used to provide archive capability, business
continuance, and disaster recovery.
TRINITY INSTITUTE OF PROFESSIONAL STUDIES
Sector – 9, Dwarka Institutional Area, New Delhi-75
TRINITY INSTITUTE OF PROFESSIONAL STUDIES
Sector – 9, Dwarka Institutional Area, New Delhi-75
Network User Applications
• E-mail: E-mail is a valuable application for most network users. Users can communicate information (messages and
files) electronically in a timely manner, to not only other users in the same network but also other users outside the
network (suppliers, information resources, and customers, for example). Examples of e-mail programs include
Microsoft Outlook and Eudora by Qualcomm.
• Web browser: A web browser enables access to the Internet through a common interface. The Internet provides a
wealth of information and has become vital to the productivity of both home and business users. Communicating with
suppliers and customers, handling orders and fulfillment, and locating information are now routinely done
electronically over the Internet, which saves time and increases overall productivity. The most commonly used
browsers are Microsoft Internet Explorer, Netscape Navigator, Mozilla, and Firefox.
• Instant messaging: Instant messaging started in the personal user-to-user space; however, it soon provided
considerable benefit in the corporate world. Now many instant messaging applications, such as those provided by AOL
and Yahoo!, provide data encryption and logging, features essential for corporate use.
• Collaboration: Working together as individuals or groups is greatly facilitated when the collaborators are on a
network. Individuals creating separate parts of an annual report or a business plan, for example, can either transmit
their data files to a central resource for compilation or use a workgroup software application to create and modify the
entire document, without any exchange of paper. One of the best-known traditional collaboration software programs is
Lotus Notes. A more modern web-based collaboration application is a wiki.
• Database: This type of application enables users on a network to store information in central locations (such as
storage devices) so that others on the network can easily retrieve selected information in the formats that are most
useful to them. Some of the most common databases used in enterprises today are Oracle and Microsoft SQL Server.
TRINITY INSTITUTE OF PROFESSIONAL STUDIES
Sector – 9, Dwarka Institutional Area, New Delhi-75
Characteristics of a Network
• Speed: Speed is a measure of how fast data is transmitted over the network. A more precise term would be data rate.
• Cost: Cost indicates the general cost of components, installation, and maintenance of the network.
• Security: Security indicates how secure the network is, including the data that is transmitted over the network. The
subject of security is important and constantly evolving. You should consider security whenever you take actions that affect
the network.
• Availability: Availability is a measure of the probability that the network will be available for use when required. For
networks that are meant to be used 24 hours a day, 7 days a week, 365 days a year, availability is calculated by dividing the
time it is actually available by the total time in a year and then multiplying by 100 to get a percentage.
• Scalability: Scalability indicates how well the network can accommodate more users and data transmission
requirements. If a network is designed and optimized for just the current requirements, it can be very expensive and
difficult to meet new needs when the network grows.
• Reliability: Reliability indicates the dependability of the components (routers, switches, PCs, and so on) that make up
the network. Reliability is often measured as a probability of failure, or mean time between failures (MTBF).
• Topology: Networks have two types of topologies: the physical topology, which is the arrangement of the cable, network
devices, and end systems (PCs and servers), and the logical topology, which is the path that the data signals take through
the physical topology.
TRINITY INSTITUTE OF PROFESSIONAL STUDIES
Sector – 9, Dwarka Institutional Area, New Delhi-75
Unit – I
Foundation
• Building network
• framing error detection
In serial communications, a framing error is the result of reading a string of symbols which are grouped in blocks at
the wrong starting point.
• Reliable transmission
• Ethernet &MAC Internetworking
A networking interface allows a computer or mobile device to connect to a local area network
(LAN) using Ethernet as the transmission mechanism.
• Switching & Bridging
• Basic Internetworking
• Routing
Routing is usually performed by a dedicated device called a router. It provide best
and shortest path to data on the network
TRINITY INSTITUTE OF PROFESSIONAL STUDIES
Sector – 9, Dwarka Institutional Area, New Delhi-75
Unit-II
Advance Internetworking
• The global Internet
• Multicast
To transmit a single message to a select group of recipients.
• MPLS(Multiprotocol Label Switching)
MPLS gives network operators a great deal of flexibility to divert and route traffic
around link failures, congestion, and bottlenecks.
• Routing among mobile Devices
• Simple Demultiplexer
A multiplexer accepts two (or more) streams of data and combines them into one stream. The mixed data streams must be separated. This is
done by demultiplexers.
• Reliable Byte Stream (TCP)
A byte stream is a bit stream, in which data bits are grouped into units, called bytes.
Reliable delivery of byte stream by TCP.
• RPC(remote procedure call)
RPC is a powerful technique for constructing distributed, client-server based applications.
• RTP
The Real-time Transport Protocol (RTP) defines a standardized packet format for delivering audio and video over IP networks. RTP is used
extensively in communication and entertainment systems that involve streaming media, such as telephony, video teleconference
applications, television services and web-based push-to-talk features.
TRINITY INSTITUTE OF PROFESSIONAL STUDIES
Sector – 9, Dwarka Institutional Area, New Delhi-75
UNIT III
Congestion Control & Resource Allocation
• TCP CongestionControl Avoidance mechanisms
• Quality of Service.
• Multimedia Networking
Using networks different users on different machines can share image, sound,
video, voice and many other features and to communicate with each under these
tools.
• Multimedia networking applications
1) stored streaming
2) live streaming
3) interactive, real-time
• RTSP, RTCP, SIP, H.323
TRINITY INSTITUTE OF PROFESSIONAL STUDIES
Sector – 9, Dwarka Institutional Area, New Delhi-75
UNIT IV
Network Security
• Cryptographic Building Blocks
There are various techniques for encrypting messages, for securely exchanging keys, for maintaining the integrity of
messages, and for guaranteeing authenticity of a message. These tools can be thought of as building blocks to
construct protection against attack.
• Symmetric Key Encryption
An encryption system in which the sender and receiver of a message share a single, common key that is used to encrypt and
decrypt the message. Symmetric-key cryptography is sometimes called secret-key cryptography
• Public Key Encryption
A cryptographic system that uses two keys -- a public key known to everyone and a private or secret key known only
to the recipient of the message.
• Authentication protocols
An authentication protocol is a type of cryptographic protocol with the purpose of authenticating entities wishing
to communicate securely. Example Kerberos, Password Authentication Protocol (PAP), Extensible Authentication Protocol (EAP)
• PGP
• is a data encryption and decryption computer program that provides cryptographic
privacy and authentication for data communication.
• TLS, SSL
• Firewalls
• Intrusion Detection
TRINITY INSTITUTE OF PROFESSIONAL STUDIES
Sector – 9, Dwarka Institutional Area, New Delhi-75
• REFERENCE BOOKS:
• [R1] Computer Networking: A Top Down
Approach (Fifth Edition), James F. Kurose
• W. Stallings, Networks Security Essentials:
Application & Standards, Pearson Education,
2000
Ad

More Related Content

What's hot (20)

Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
Ashita Agrawal
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
VijayaLakshmi514
 
Vision of cloud computing
Vision of cloud computingVision of cloud computing
Vision of cloud computing
gaurav jain
 
Client server model
Client server modelClient server model
Client server model
Gd Goenka University
 
Transport layer
Transport layer Transport layer
Transport layer
Mukesh Chinta
 
operating system structure
operating system structureoperating system structure
operating system structure
Waseem Ud Din Farooqui
 
Basics Of Networking (Overview)
Basics Of Networking (Overview)Basics Of Networking (Overview)
Basics Of Networking (Overview)
ashiesh0007
 
Introduction to Parallel and Distributed Computing
Introduction to Parallel and Distributed ComputingIntroduction to Parallel and Distributed Computing
Introduction to Parallel and Distributed Computing
Sayed Chhattan Shah
 
Data link layer
Data link layer Data link layer
Data link layer
Mukesh Chinta
 
Flow control in Computer Network
Flow control in Computer NetworkFlow control in Computer Network
Flow control in Computer Network
Ahtesham Ullah khan
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
extraganesh
 
Distributed database
Distributed databaseDistributed database
Distributed database
ReachLocal Services India
 
Distance vector routing
Distance vector routingDistance vector routing
Distance vector routing
Siddique Ibrahim
 
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...
Gyanmanjari Institute Of Technology
 
Cluster Computing
Cluster ComputingCluster Computing
Cluster Computing
BOSS Webtech
 
Security in distributed systems
Security in distributed systems Security in distributed systems
Security in distributed systems
Haitham Ahmed
 
Query processing
Query processingQuery processing
Query processing
Dr. C.V. Suresh Babu
 
distributed Computing system model
distributed Computing system modeldistributed Computing system model
distributed Computing system model
Harshad Umredkar
 
Using prior knowledge to initialize the hypothesis,kbann
Using prior knowledge to initialize the hypothesis,kbannUsing prior knowledge to initialize the hypothesis,kbann
Using prior knowledge to initialize the hypothesis,kbann
swapnac12
 
Dynamic interconnection networks
Dynamic interconnection networksDynamic interconnection networks
Dynamic interconnection networks
Prasenjit Dey
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
Ashita Agrawal
 
Vision of cloud computing
Vision of cloud computingVision of cloud computing
Vision of cloud computing
gaurav jain
 
Basics Of Networking (Overview)
Basics Of Networking (Overview)Basics Of Networking (Overview)
Basics Of Networking (Overview)
ashiesh0007
 
Introduction to Parallel and Distributed Computing
Introduction to Parallel and Distributed ComputingIntroduction to Parallel and Distributed Computing
Introduction to Parallel and Distributed Computing
Sayed Chhattan Shah
 
Flow control in Computer Network
Flow control in Computer NetworkFlow control in Computer Network
Flow control in Computer Network
Ahtesham Ullah khan
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
extraganesh
 
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...
Gyanmanjari Institute Of Technology
 
Security in distributed systems
Security in distributed systems Security in distributed systems
Security in distributed systems
Haitham Ahmed
 
distributed Computing system model
distributed Computing system modeldistributed Computing system model
distributed Computing system model
Harshad Umredkar
 
Using prior knowledge to initialize the hypothesis,kbann
Using prior knowledge to initialize the hypothesis,kbannUsing prior knowledge to initialize the hypothesis,kbann
Using prior knowledge to initialize the hypothesis,kbann
swapnac12
 
Dynamic interconnection networks
Dynamic interconnection networksDynamic interconnection networks
Dynamic interconnection networks
Prasenjit Dey
 

Viewers also liked (20)

BASIC TO ADVANCED NETWORKING TUTORIALS
BASIC TO ADVANCED NETWORKING TUTORIALSBASIC TO ADVANCED NETWORKING TUTORIALS
BASIC TO ADVANCED NETWORKING TUTORIALS
Varinder Singh Walia
 
Basic To Advanced Networking
Basic To Advanced NetworkingBasic To Advanced Networking
Basic To Advanced Networking
Beth Bridges Author, Speaker, Technology Marketer
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
Kak Yong
 
Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)
Varinder Singh Walia
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentals
jpprakash
 
Crc
CrcCrc
Crc
CHINTAN Patel
 
1. computer networks u1 ver 1.0
1. computer networks u1 ver 1.01. computer networks u1 ver 1.0
1. computer networks u1 ver 1.0
Dr. C.V. Suresh Babu
 
Advance hardware devices
Advance hardware devicesAdvance hardware devices
Advance hardware devices
Varinder Singh Walia
 
Ethertnet data transfer.ppt
Ethertnet data transfer.pptEthertnet data transfer.ppt
Ethertnet data transfer.ppt
Mantra VLSI
 
CRC Error coding technique
CRC Error coding techniqueCRC Error coding technique
CRC Error coding technique
Mantra VLSI
 
20 common ports and their purposes
20 common ports and their purposes20 common ports and their purposes
20 common ports and their purposes
Owlishes
 
Well known protocols port numbers
Well known  protocols port numbersWell known  protocols port numbers
Well known protocols port numbers
Varinder Singh Walia
 
Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocol
Varinder Singh Walia
 
CCN -UNIT 1 PDF Notes for 7th EC
CCN -UNIT 1 PDF Notes for 7th ECCCN -UNIT 1 PDF Notes for 7th EC
CCN -UNIT 1 PDF Notes for 7th EC
SURESHA V
 
Acn presentation
Acn presentationAcn presentation
Acn presentation
rizgohar
 
The 20 Common ports
The 20 Common portsThe 20 Common ports
The 20 Common ports
RKabbaniFTW
 
Presentation on cyclic redundancy check (crc)
Presentation on cyclic redundancy check (crc)Presentation on cyclic redundancy check (crc)
Presentation on cyclic redundancy check (crc)
Sudhanshu Srivastava
 
Introduction to Computer Networks
 Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer Networks
Ghaffar Khan
 
Computer Network
Computer NetworkComputer Network
Computer Network
AkShay Dhola
 
RIP - Routing Information Protocol
RIP - Routing Information ProtocolRIP - Routing Information Protocol
RIP - Routing Information Protocol
selvakumar_b1985
 
BASIC TO ADVANCED NETWORKING TUTORIALS
BASIC TO ADVANCED NETWORKING TUTORIALSBASIC TO ADVANCED NETWORKING TUTORIALS
BASIC TO ADVANCED NETWORKING TUTORIALS
Varinder Singh Walia
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
Kak Yong
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentals
jpprakash
 
Ethertnet data transfer.ppt
Ethertnet data transfer.pptEthertnet data transfer.ppt
Ethertnet data transfer.ppt
Mantra VLSI
 
CRC Error coding technique
CRC Error coding techniqueCRC Error coding technique
CRC Error coding technique
Mantra VLSI
 
20 common ports and their purposes
20 common ports and their purposes20 common ports and their purposes
20 common ports and their purposes
Owlishes
 
CCN -UNIT 1 PDF Notes for 7th EC
CCN -UNIT 1 PDF Notes for 7th ECCCN -UNIT 1 PDF Notes for 7th EC
CCN -UNIT 1 PDF Notes for 7th EC
SURESHA V
 
Acn presentation
Acn presentationAcn presentation
Acn presentation
rizgohar
 
The 20 Common ports
The 20 Common portsThe 20 Common ports
The 20 Common ports
RKabbaniFTW
 
Presentation on cyclic redundancy check (crc)
Presentation on cyclic redundancy check (crc)Presentation on cyclic redundancy check (crc)
Presentation on cyclic redundancy check (crc)
Sudhanshu Srivastava
 
Introduction to Computer Networks
 Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer Networks
Ghaffar Khan
 
RIP - Routing Information Protocol
RIP - Routing Information ProtocolRIP - Routing Information Protocol
RIP - Routing Information Protocol
selvakumar_b1985
 
Ad

Similar to Advanced computer network (20)

UNIT 4 computer networking powerpoint presentation .pdf
UNIT 4 computer networking powerpoint presentation .pdfUNIT 4 computer networking powerpoint presentation .pdf
UNIT 4 computer networking powerpoint presentation .pdf
shubhangisonawane6
 
Introduction(2)
Introduction(2)Introduction(2)
Introduction(2)
trayyoo
 
EDT 323 Internet and Intranet 2022 Final.pptx
EDT 323 Internet and Intranet 2022 Final.pptxEDT 323 Internet and Intranet 2022 Final.pptx
EDT 323 Internet and Intranet 2022 Final.pptx
Gambari Amosa Isiaka
 
Information and Communication Technology.pptx
Information and Communication Technology.pptxInformation and Communication Technology.pptx
Information and Communication Technology.pptx
Anupama54
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
SNEHKUMAR30
 
basic networking and topologies explained.ppt
basic networking and topologies explained.pptbasic networking and topologies explained.ppt
basic networking and topologies explained.ppt
LahiruRatnayake2
 
cloud computing.ppt
cloud computing.pptcloud computing.ppt
cloud computing.ppt
MunmunSaha7
 
Data Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHAData Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHA
IRJET Journal
 
Project DRAC: Creating an applications-aware network
Project DRAC: Creating an applications-aware networkProject DRAC: Creating an applications-aware network
Project DRAC: Creating an applications-aware network
Tal Lavian Ph.D.
 
Introduction to Cloud Computing, Overview
Introduction to Cloud Computing, OverviewIntroduction to Cloud Computing, Overview
Introduction to Cloud Computing, Overview
SudiptaDas684406
 
Cloud-Computing-32-40[1].pptx...,..........
Cloud-Computing-32-40[1].pptx...,..........Cloud-Computing-32-40[1].pptx...,..........
Cloud-Computing-32-40[1].pptx...,..........
PreetiKumari491761
 
76924356 synopsis-network
76924356 synopsis-network76924356 synopsis-network
76924356 synopsis-network
lklokesh
 
1. Next generation networks convergence.
1. Next generation networks convergence.1. Next generation networks convergence.
1. Next generation networks convergence.
VishalBairagi11
 
COM526_Lecture 1.pdf
COM526_Lecture 1.pdfCOM526_Lecture 1.pdf
COM526_Lecture 1.pdf
SherefHesham
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Arar Fahem
 
Cloud Computing_Module3-1.pptxnsjsjajajajaja
Cloud Computing_Module3-1.pptxnsjsjajajajajaCloud Computing_Module3-1.pptxnsjsjajajajaja
Cloud Computing_Module3-1.pptxnsjsjajajajaja
Shivang100
 
IJSRED-V1I1P1
IJSRED-V1I1P1IJSRED-V1I1P1
IJSRED-V1I1P1
IJSRED
 
Privacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storagePrivacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storage
dbpublications
 
Chapter01 Exploration1.Presentation Study
Chapter01 Exploration1.Presentation StudyChapter01 Exploration1.Presentation Study
Chapter01 Exploration1.Presentation Study
subidomaryjoy3025
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Ripal Ranpara
 
UNIT 4 computer networking powerpoint presentation .pdf
UNIT 4 computer networking powerpoint presentation .pdfUNIT 4 computer networking powerpoint presentation .pdf
UNIT 4 computer networking powerpoint presentation .pdf
shubhangisonawane6
 
Introduction(2)
Introduction(2)Introduction(2)
Introduction(2)
trayyoo
 
EDT 323 Internet and Intranet 2022 Final.pptx
EDT 323 Internet and Intranet 2022 Final.pptxEDT 323 Internet and Intranet 2022 Final.pptx
EDT 323 Internet and Intranet 2022 Final.pptx
Gambari Amosa Isiaka
 
Information and Communication Technology.pptx
Information and Communication Technology.pptxInformation and Communication Technology.pptx
Information and Communication Technology.pptx
Anupama54
 
basic networking and topologies explained.ppt
basic networking and topologies explained.pptbasic networking and topologies explained.ppt
basic networking and topologies explained.ppt
LahiruRatnayake2
 
cloud computing.ppt
cloud computing.pptcloud computing.ppt
cloud computing.ppt
MunmunSaha7
 
Data Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHAData Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHA
IRJET Journal
 
Project DRAC: Creating an applications-aware network
Project DRAC: Creating an applications-aware networkProject DRAC: Creating an applications-aware network
Project DRAC: Creating an applications-aware network
Tal Lavian Ph.D.
 
Introduction to Cloud Computing, Overview
Introduction to Cloud Computing, OverviewIntroduction to Cloud Computing, Overview
Introduction to Cloud Computing, Overview
SudiptaDas684406
 
Cloud-Computing-32-40[1].pptx...,..........
Cloud-Computing-32-40[1].pptx...,..........Cloud-Computing-32-40[1].pptx...,..........
Cloud-Computing-32-40[1].pptx...,..........
PreetiKumari491761
 
76924356 synopsis-network
76924356 synopsis-network76924356 synopsis-network
76924356 synopsis-network
lklokesh
 
1. Next generation networks convergence.
1. Next generation networks convergence.1. Next generation networks convergence.
1. Next generation networks convergence.
VishalBairagi11
 
COM526_Lecture 1.pdf
COM526_Lecture 1.pdfCOM526_Lecture 1.pdf
COM526_Lecture 1.pdf
SherefHesham
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Arar Fahem
 
Cloud Computing_Module3-1.pptxnsjsjajajajaja
Cloud Computing_Module3-1.pptxnsjsjajajajajaCloud Computing_Module3-1.pptxnsjsjajajajaja
Cloud Computing_Module3-1.pptxnsjsjajajajaja
Shivang100
 
IJSRED-V1I1P1
IJSRED-V1I1P1IJSRED-V1I1P1
IJSRED-V1I1P1
IJSRED
 
Privacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storagePrivacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storage
dbpublications
 
Chapter01 Exploration1.Presentation Study
Chapter01 Exploration1.Presentation StudyChapter01 Exploration1.Presentation Study
Chapter01 Exploration1.Presentation Study
subidomaryjoy3025
 
Ad

More from Trinity Dwarka (20)

Why BAJMC in Trinity Dwarka
Why BAJMC in Trinity DwarkaWhy BAJMC in Trinity Dwarka
Why BAJMC in Trinity Dwarka
Trinity Dwarka
 
Career Options after BCA
Career Options after BCACareer Options after BCA
Career Options after BCA
Trinity Dwarka
 
Principles of Management-Management-Concept & Meaning
  Principles of Management-Management-Concept & Meaning  Principles of Management-Management-Concept & Meaning
Principles of Management-Management-Concept & Meaning
Trinity Dwarka
 
Principles of Management- Management Process & Functions
Principles of Management- Management Process  &  FunctionsPrinciples of Management- Management Process  &  Functions
Principles of Management- Management Process & Functions
Trinity Dwarka
 
Principles of Management- Managerial Levels & Roles-
Principles of Management- Managerial Levels & Roles-Principles of Management- Managerial Levels & Roles-
Principles of Management- Managerial Levels & Roles-
Trinity Dwarka
 
Management-Concept & Meaning
 Management-Concept & Meaning Management-Concept & Meaning
Management-Concept & Meaning
Trinity Dwarka
 
Principles of Management- Planning
Principles of Management- PlanningPrinciples of Management- Planning
Principles of Management- Planning
Trinity Dwarka
 
Organizing Authority & Responsibility- Principles of Management
Organizing Authority & Responsibility- Principles of ManagementOrganizing Authority & Responsibility- Principles of Management
Organizing Authority & Responsibility- Principles of Management
Trinity Dwarka
 
Staffing- Principles of Management
Staffing- Principles of ManagementStaffing- Principles of Management
Staffing- Principles of Management
Trinity Dwarka
 
Directing-Principles of Management
Directing-Principles of ManagementDirecting-Principles of Management
Directing-Principles of Management
Trinity Dwarka
 
Dimensional Modelling-Data Warehouse & Data Mining
 Dimensional Modelling-Data Warehouse & Data Mining Dimensional Modelling-Data Warehouse & Data Mining
Dimensional Modelling-Data Warehouse & Data Mining
Trinity Dwarka
 
Data Preprocessing- Data Warehouse & Data Mining
Data Preprocessing- Data Warehouse & Data MiningData Preprocessing- Data Warehouse & Data Mining
Data Preprocessing- Data Warehouse & Data Mining
Trinity Dwarka
 
Computer Networks- Network Basics
Computer Networks- Network BasicsComputer Networks- Network Basics
Computer Networks- Network Basics
Trinity Dwarka
 
Java Programming- Introduction to Java Applet Programs
Java Programming- Introduction to Java Applet ProgramsJava Programming- Introduction to Java Applet Programs
Java Programming- Introduction to Java Applet Programs
Trinity Dwarka
 
Linux Environment- Linux vs Unix
Linux Environment- Linux vs UnixLinux Environment- Linux vs Unix
Linux Environment- Linux vs Unix
Trinity Dwarka
 
Linux Environment- Linux Basics
Linux Environment- Linux BasicsLinux Environment- Linux Basics
Linux Environment- Linux Basics
Trinity Dwarka
 
BCA-Mobile Computing- BASICS OF MOBILE COMPUTING
BCA-Mobile Computing- BASICS OF MOBILE COMPUTINGBCA-Mobile Computing- BASICS OF MOBILE COMPUTING
BCA-Mobile Computing- BASICS OF MOBILE COMPUTING
Trinity Dwarka
 
INTRODUCTION TO INFORMATION TECHNOLOGY- IT Basics
INTRODUCTION TO INFORMATION TECHNOLOGY- IT BasicsINTRODUCTION TO INFORMATION TECHNOLOGY- IT Basics
INTRODUCTION TO INFORMATION TECHNOLOGY- IT Basics
Trinity Dwarka
 
Database Management System
Database Management System Database Management System
Database Management System
Trinity Dwarka
 
JAVA PROGRAMMING- OOP Concept
JAVA PROGRAMMING- OOP ConceptJAVA PROGRAMMING- OOP Concept
JAVA PROGRAMMING- OOP Concept
Trinity Dwarka
 
Why BAJMC in Trinity Dwarka
Why BAJMC in Trinity DwarkaWhy BAJMC in Trinity Dwarka
Why BAJMC in Trinity Dwarka
Trinity Dwarka
 
Career Options after BCA
Career Options after BCACareer Options after BCA
Career Options after BCA
Trinity Dwarka
 
Principles of Management-Management-Concept & Meaning
  Principles of Management-Management-Concept & Meaning  Principles of Management-Management-Concept & Meaning
Principles of Management-Management-Concept & Meaning
Trinity Dwarka
 
Principles of Management- Management Process & Functions
Principles of Management- Management Process  &  FunctionsPrinciples of Management- Management Process  &  Functions
Principles of Management- Management Process & Functions
Trinity Dwarka
 
Principles of Management- Managerial Levels & Roles-
Principles of Management- Managerial Levels & Roles-Principles of Management- Managerial Levels & Roles-
Principles of Management- Managerial Levels & Roles-
Trinity Dwarka
 
Management-Concept & Meaning
 Management-Concept & Meaning Management-Concept & Meaning
Management-Concept & Meaning
Trinity Dwarka
 
Principles of Management- Planning
Principles of Management- PlanningPrinciples of Management- Planning
Principles of Management- Planning
Trinity Dwarka
 
Organizing Authority & Responsibility- Principles of Management
Organizing Authority & Responsibility- Principles of ManagementOrganizing Authority & Responsibility- Principles of Management
Organizing Authority & Responsibility- Principles of Management
Trinity Dwarka
 
Staffing- Principles of Management
Staffing- Principles of ManagementStaffing- Principles of Management
Staffing- Principles of Management
Trinity Dwarka
 
Directing-Principles of Management
Directing-Principles of ManagementDirecting-Principles of Management
Directing-Principles of Management
Trinity Dwarka
 
Dimensional Modelling-Data Warehouse & Data Mining
 Dimensional Modelling-Data Warehouse & Data Mining Dimensional Modelling-Data Warehouse & Data Mining
Dimensional Modelling-Data Warehouse & Data Mining
Trinity Dwarka
 
Data Preprocessing- Data Warehouse & Data Mining
Data Preprocessing- Data Warehouse & Data MiningData Preprocessing- Data Warehouse & Data Mining
Data Preprocessing- Data Warehouse & Data Mining
Trinity Dwarka
 
Computer Networks- Network Basics
Computer Networks- Network BasicsComputer Networks- Network Basics
Computer Networks- Network Basics
Trinity Dwarka
 
Java Programming- Introduction to Java Applet Programs
Java Programming- Introduction to Java Applet ProgramsJava Programming- Introduction to Java Applet Programs
Java Programming- Introduction to Java Applet Programs
Trinity Dwarka
 
Linux Environment- Linux vs Unix
Linux Environment- Linux vs UnixLinux Environment- Linux vs Unix
Linux Environment- Linux vs Unix
Trinity Dwarka
 
Linux Environment- Linux Basics
Linux Environment- Linux BasicsLinux Environment- Linux Basics
Linux Environment- Linux Basics
Trinity Dwarka
 
BCA-Mobile Computing- BASICS OF MOBILE COMPUTING
BCA-Mobile Computing- BASICS OF MOBILE COMPUTINGBCA-Mobile Computing- BASICS OF MOBILE COMPUTING
BCA-Mobile Computing- BASICS OF MOBILE COMPUTING
Trinity Dwarka
 
INTRODUCTION TO INFORMATION TECHNOLOGY- IT Basics
INTRODUCTION TO INFORMATION TECHNOLOGY- IT BasicsINTRODUCTION TO INFORMATION TECHNOLOGY- IT Basics
INTRODUCTION TO INFORMATION TECHNOLOGY- IT Basics
Trinity Dwarka
 
Database Management System
Database Management System Database Management System
Database Management System
Trinity Dwarka
 
JAVA PROGRAMMING- OOP Concept
JAVA PROGRAMMING- OOP ConceptJAVA PROGRAMMING- OOP Concept
JAVA PROGRAMMING- OOP Concept
Trinity Dwarka
 

Recently uploaded (20)

The History of Kashmir Lohar Dynasty NEP.ppt
The History of Kashmir Lohar Dynasty NEP.pptThe History of Kashmir Lohar Dynasty NEP.ppt
The History of Kashmir Lohar Dynasty NEP.ppt
Arya Mahila P. G. College, Banaras Hindu University, Varanasi, India.
 
LDMMIA Reiki Yoga S6 Free Workshop Money Pt 2
LDMMIA Reiki Yoga S6 Free Workshop Money Pt 2LDMMIA Reiki Yoga S6 Free Workshop Money Pt 2
LDMMIA Reiki Yoga S6 Free Workshop Money Pt 2
LDM & Mia eStudios
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...
BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...
BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...
Nguyen Thanh Tu Collection
 
Cyber security COPA ITI MCQ Top Questions
Cyber security COPA ITI MCQ Top QuestionsCyber security COPA ITI MCQ Top Questions
Cyber security COPA ITI MCQ Top Questions
SONU HEETSON
 
MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)
MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)
MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)
Dr. Nasir Mustafa
 
MCQS (EMERGENCY NURSING) DR. NASIR MUSTAFA
MCQS (EMERGENCY NURSING) DR. NASIR MUSTAFAMCQS (EMERGENCY NURSING) DR. NASIR MUSTAFA
MCQS (EMERGENCY NURSING) DR. NASIR MUSTAFA
Dr. Nasir Mustafa
 
How To Maximize Sales Performance using Odoo 18 Diverse views in sales module
How To Maximize Sales Performance using Odoo 18 Diverse views in sales moduleHow To Maximize Sales Performance using Odoo 18 Diverse views in sales module
How To Maximize Sales Performance using Odoo 18 Diverse views in sales module
Celine George
 
Final Evaluation.docx...........................
Final Evaluation.docx...........................Final Evaluation.docx...........................
Final Evaluation.docx...........................
l1bbyburrell
 
MEDICAL BIOLOGY MCQS BY. DR NASIR MUSTAFA
MEDICAL BIOLOGY MCQS  BY. DR NASIR MUSTAFAMEDICAL BIOLOGY MCQS  BY. DR NASIR MUSTAFA
MEDICAL BIOLOGY MCQS BY. DR NASIR MUSTAFA
Dr. Nasir Mustafa
 
Pope Leo XIV, the first Pope from North America.pptx
Pope Leo XIV, the first Pope from North America.pptxPope Leo XIV, the first Pope from North America.pptx
Pope Leo XIV, the first Pope from North America.pptx
Martin M Flynn
 
How to Add Button in Chatter in Odoo 18 - Odoo Slides
How to Add Button in Chatter in Odoo 18 - Odoo SlidesHow to Add Button in Chatter in Odoo 18 - Odoo Slides
How to Add Button in Chatter in Odoo 18 - Odoo Slides
Celine George
 
Mental Health Assessment in 5th semester bsc. nursing and also used in 2nd ye...
Mental Health Assessment in 5th semester bsc. nursing and also used in 2nd ye...Mental Health Assessment in 5th semester bsc. nursing and also used in 2nd ye...
Mental Health Assessment in 5th semester bsc. nursing and also used in 2nd ye...
parmarjuli1412
 
How to Manage Amounts in Local Currency in Odoo 18 Purchase
How to Manage Amounts in Local Currency in Odoo 18 PurchaseHow to Manage Amounts in Local Currency in Odoo 18 Purchase
How to Manage Amounts in Local Currency in Odoo 18 Purchase
Celine George
 
GENERAL QUIZ PRELIMS | QUIZ CLUB OF PSGCAS | 4 MARCH 2025 .pdf
GENERAL QUIZ PRELIMS | QUIZ CLUB OF PSGCAS | 4 MARCH 2025 .pdfGENERAL QUIZ PRELIMS | QUIZ CLUB OF PSGCAS | 4 MARCH 2025 .pdf
GENERAL QUIZ PRELIMS | QUIZ CLUB OF PSGCAS | 4 MARCH 2025 .pdf
Quiz Club of PSG College of Arts & Science
 
How to Configure Extra Steps During Checkout in Odoo 18 Website
How to Configure Extra Steps During Checkout in Odoo 18 WebsiteHow to Configure Extra Steps During Checkout in Odoo 18 Website
How to Configure Extra Steps During Checkout in Odoo 18 Website
Celine George
 
Rebuilding the library community in a post-Twitter world
Rebuilding the library community in a post-Twitter worldRebuilding the library community in a post-Twitter world
Rebuilding the library community in a post-Twitter world
Ned Potter
 
INDIA QUIZ FOR SCHOOLS | THE QUIZ CLUB OF PSGCAS | AUGUST 2024
INDIA QUIZ FOR SCHOOLS | THE QUIZ CLUB OF PSGCAS | AUGUST 2024INDIA QUIZ FOR SCHOOLS | THE QUIZ CLUB OF PSGCAS | AUGUST 2024
INDIA QUIZ FOR SCHOOLS | THE QUIZ CLUB OF PSGCAS | AUGUST 2024
Quiz Club of PSG College of Arts & Science
 
INQUISITORS School Quiz Prelims 2025.pptx
INQUISITORS School Quiz Prelims 2025.pptxINQUISITORS School Quiz Prelims 2025.pptx
INQUISITORS School Quiz Prelims 2025.pptx
SujatyaRoy
 
Module_2_Types_and_Approaches_of_Research (2).pptx
Module_2_Types_and_Approaches_of_Research (2).pptxModule_2_Types_and_Approaches_of_Research (2).pptx
Module_2_Types_and_Approaches_of_Research (2).pptx
drroxannekemp
 
libbys peer assesment.docx..............
libbys peer assesment.docx..............libbys peer assesment.docx..............
libbys peer assesment.docx..............
19lburrell
 
LDMMIA Reiki Yoga S6 Free Workshop Money Pt 2
LDMMIA Reiki Yoga S6 Free Workshop Money Pt 2LDMMIA Reiki Yoga S6 Free Workshop Money Pt 2
LDMMIA Reiki Yoga S6 Free Workshop Money Pt 2
LDM & Mia eStudios
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...
BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...
BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...
Nguyen Thanh Tu Collection
 
Cyber security COPA ITI MCQ Top Questions
Cyber security COPA ITI MCQ Top QuestionsCyber security COPA ITI MCQ Top Questions
Cyber security COPA ITI MCQ Top Questions
SONU HEETSON
 
MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)
MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)
MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)
Dr. Nasir Mustafa
 
MCQS (EMERGENCY NURSING) DR. NASIR MUSTAFA
MCQS (EMERGENCY NURSING) DR. NASIR MUSTAFAMCQS (EMERGENCY NURSING) DR. NASIR MUSTAFA
MCQS (EMERGENCY NURSING) DR. NASIR MUSTAFA
Dr. Nasir Mustafa
 
How To Maximize Sales Performance using Odoo 18 Diverse views in sales module
How To Maximize Sales Performance using Odoo 18 Diverse views in sales moduleHow To Maximize Sales Performance using Odoo 18 Diverse views in sales module
How To Maximize Sales Performance using Odoo 18 Diverse views in sales module
Celine George
 
Final Evaluation.docx...........................
Final Evaluation.docx...........................Final Evaluation.docx...........................
Final Evaluation.docx...........................
l1bbyburrell
 
MEDICAL BIOLOGY MCQS BY. DR NASIR MUSTAFA
MEDICAL BIOLOGY MCQS  BY. DR NASIR MUSTAFAMEDICAL BIOLOGY MCQS  BY. DR NASIR MUSTAFA
MEDICAL BIOLOGY MCQS BY. DR NASIR MUSTAFA
Dr. Nasir Mustafa
 
Pope Leo XIV, the first Pope from North America.pptx
Pope Leo XIV, the first Pope from North America.pptxPope Leo XIV, the first Pope from North America.pptx
Pope Leo XIV, the first Pope from North America.pptx
Martin M Flynn
 
How to Add Button in Chatter in Odoo 18 - Odoo Slides
How to Add Button in Chatter in Odoo 18 - Odoo SlidesHow to Add Button in Chatter in Odoo 18 - Odoo Slides
How to Add Button in Chatter in Odoo 18 - Odoo Slides
Celine George
 
Mental Health Assessment in 5th semester bsc. nursing and also used in 2nd ye...
Mental Health Assessment in 5th semester bsc. nursing and also used in 2nd ye...Mental Health Assessment in 5th semester bsc. nursing and also used in 2nd ye...
Mental Health Assessment in 5th semester bsc. nursing and also used in 2nd ye...
parmarjuli1412
 
How to Manage Amounts in Local Currency in Odoo 18 Purchase
How to Manage Amounts in Local Currency in Odoo 18 PurchaseHow to Manage Amounts in Local Currency in Odoo 18 Purchase
How to Manage Amounts in Local Currency in Odoo 18 Purchase
Celine George
 
How to Configure Extra Steps During Checkout in Odoo 18 Website
How to Configure Extra Steps During Checkout in Odoo 18 WebsiteHow to Configure Extra Steps During Checkout in Odoo 18 Website
How to Configure Extra Steps During Checkout in Odoo 18 Website
Celine George
 
Rebuilding the library community in a post-Twitter world
Rebuilding the library community in a post-Twitter worldRebuilding the library community in a post-Twitter world
Rebuilding the library community in a post-Twitter world
Ned Potter
 
INQUISITORS School Quiz Prelims 2025.pptx
INQUISITORS School Quiz Prelims 2025.pptxINQUISITORS School Quiz Prelims 2025.pptx
INQUISITORS School Quiz Prelims 2025.pptx
SujatyaRoy
 
Module_2_Types_and_Approaches_of_Research (2).pptx
Module_2_Types_and_Approaches_of_Research (2).pptxModule_2_Types_and_Approaches_of_Research (2).pptx
Module_2_Types_and_Approaches_of_Research (2).pptx
drroxannekemp
 
libbys peer assesment.docx..............
libbys peer assesment.docx..............libbys peer assesment.docx..............
libbys peer assesment.docx..............
19lburrell
 

Advanced computer network

  • 1. TRINITY INSTITUTE OF PROFESSIONAL STUDIES Sector – 9, Dwarka Institutional Area, New Delhi-75 Affiliated Institution of G.G.S.IP.U, Delhi ADVANCED COMPUTER NETWORK -20304 ACN
  • 2. TRINITY INSTITUTE OF PROFESSIONAL STUDIES Sector – 9, Dwarka Institutional Area, New Delhi-75 Affiliated Institution of G.G.S.IP.U, Delhi Advanced computer network ACN-20304
  • 3. TRINITY INSTITUTE OF PROFESSIONAL STUDIES Sector – 9, Dwarka Institutional Area, New Delhi-75 Network • A network is a connected collection of devices and end systems, such as computers and servers, that can communicate with each other. • Networks carry data in many types of environments, including homes, small businesses, and large enterprises. In a large enterprise, a number of locations might need to communicate with each other, and you can describe those locations as follows
  • 4. TRINITY INSTITUTE OF PROFESSIONAL STUDIES Sector – 9, Dwarka Institutional Area, New Delhi-75 Locations • Main office: • Remote locations • Branch offices: • Home offices: • Mobile users
  • 5. TRINITY INSTITUTE OF PROFESSIONAL STUDIES Sector – 9, Dwarka Institutional Area, New Delhi-75 Resource-Sharing Functions and Benefits • The main functions of computer networks in business today are to simplify and streamline business processes through the use of data and application sharing. Networks enable end users to share both information and hardware resources. By providing this interconnection between the users and common sets of data, businesses can make more efficient use of their resources. The major resources that are shared in a computer network include the following:
  • 6. TRINITY INSTITUTE OF PROFESSIONAL STUDIES Sector – 9, Dwarka Institutional Area, New Delhi-75 Resource sharing • Data and applications: When users are connected through a network, they can share files and even software application programs, making data more easily available and promoting more efficient collaboration on work projects. • Physical resources: The resources that can be shared include both input devices, such as cameras, and output devices, such as printers. • Network storage: Today the network makes storage available to users in several ways. Direct attached storage (DAS) directly connects physical storage to a PC or a shared server. Network attached storage (NAS) makes storage available through a special network appliance. Finally, storage area networks (SAN) provide a network of storage devices. • Backup devices: A network can also include backup devices, such as tape drives, that provide a central means to save files from multiple computers. Network storage is also used to provide archive capability, business continuance, and disaster recovery.
  • 7. TRINITY INSTITUTE OF PROFESSIONAL STUDIES Sector – 9, Dwarka Institutional Area, New Delhi-75
  • 8. TRINITY INSTITUTE OF PROFESSIONAL STUDIES Sector – 9, Dwarka Institutional Area, New Delhi-75 Network User Applications • E-mail: E-mail is a valuable application for most network users. Users can communicate information (messages and files) electronically in a timely manner, to not only other users in the same network but also other users outside the network (suppliers, information resources, and customers, for example). Examples of e-mail programs include Microsoft Outlook and Eudora by Qualcomm. • Web browser: A web browser enables access to the Internet through a common interface. The Internet provides a wealth of information and has become vital to the productivity of both home and business users. Communicating with suppliers and customers, handling orders and fulfillment, and locating information are now routinely done electronically over the Internet, which saves time and increases overall productivity. The most commonly used browsers are Microsoft Internet Explorer, Netscape Navigator, Mozilla, and Firefox. • Instant messaging: Instant messaging started in the personal user-to-user space; however, it soon provided considerable benefit in the corporate world. Now many instant messaging applications, such as those provided by AOL and Yahoo!, provide data encryption and logging, features essential for corporate use. • Collaboration: Working together as individuals or groups is greatly facilitated when the collaborators are on a network. Individuals creating separate parts of an annual report or a business plan, for example, can either transmit their data files to a central resource for compilation or use a workgroup software application to create and modify the entire document, without any exchange of paper. One of the best-known traditional collaboration software programs is Lotus Notes. A more modern web-based collaboration application is a wiki. • Database: This type of application enables users on a network to store information in central locations (such as storage devices) so that others on the network can easily retrieve selected information in the formats that are most useful to them. Some of the most common databases used in enterprises today are Oracle and Microsoft SQL Server.
  • 9. TRINITY INSTITUTE OF PROFESSIONAL STUDIES Sector – 9, Dwarka Institutional Area, New Delhi-75 Characteristics of a Network • Speed: Speed is a measure of how fast data is transmitted over the network. A more precise term would be data rate. • Cost: Cost indicates the general cost of components, installation, and maintenance of the network. • Security: Security indicates how secure the network is, including the data that is transmitted over the network. The subject of security is important and constantly evolving. You should consider security whenever you take actions that affect the network. • Availability: Availability is a measure of the probability that the network will be available for use when required. For networks that are meant to be used 24 hours a day, 7 days a week, 365 days a year, availability is calculated by dividing the time it is actually available by the total time in a year and then multiplying by 100 to get a percentage. • Scalability: Scalability indicates how well the network can accommodate more users and data transmission requirements. If a network is designed and optimized for just the current requirements, it can be very expensive and difficult to meet new needs when the network grows. • Reliability: Reliability indicates the dependability of the components (routers, switches, PCs, and so on) that make up the network. Reliability is often measured as a probability of failure, or mean time between failures (MTBF). • Topology: Networks have two types of topologies: the physical topology, which is the arrangement of the cable, network devices, and end systems (PCs and servers), and the logical topology, which is the path that the data signals take through the physical topology.
  • 10. TRINITY INSTITUTE OF PROFESSIONAL STUDIES Sector – 9, Dwarka Institutional Area, New Delhi-75 Unit – I Foundation • Building network • framing error detection In serial communications, a framing error is the result of reading a string of symbols which are grouped in blocks at the wrong starting point. • Reliable transmission • Ethernet &MAC Internetworking A networking interface allows a computer or mobile device to connect to a local area network (LAN) using Ethernet as the transmission mechanism. • Switching & Bridging • Basic Internetworking • Routing Routing is usually performed by a dedicated device called a router. It provide best and shortest path to data on the network
  • 11. TRINITY INSTITUTE OF PROFESSIONAL STUDIES Sector – 9, Dwarka Institutional Area, New Delhi-75 Unit-II Advance Internetworking • The global Internet • Multicast To transmit a single message to a select group of recipients. • MPLS(Multiprotocol Label Switching) MPLS gives network operators a great deal of flexibility to divert and route traffic around link failures, congestion, and bottlenecks. • Routing among mobile Devices • Simple Demultiplexer A multiplexer accepts two (or more) streams of data and combines them into one stream. The mixed data streams must be separated. This is done by demultiplexers. • Reliable Byte Stream (TCP) A byte stream is a bit stream, in which data bits are grouped into units, called bytes. Reliable delivery of byte stream by TCP. • RPC(remote procedure call) RPC is a powerful technique for constructing distributed, client-server based applications. • RTP The Real-time Transport Protocol (RTP) defines a standardized packet format for delivering audio and video over IP networks. RTP is used extensively in communication and entertainment systems that involve streaming media, such as telephony, video teleconference applications, television services and web-based push-to-talk features.
  • 12. TRINITY INSTITUTE OF PROFESSIONAL STUDIES Sector – 9, Dwarka Institutional Area, New Delhi-75 UNIT III Congestion Control & Resource Allocation • TCP CongestionControl Avoidance mechanisms • Quality of Service. • Multimedia Networking Using networks different users on different machines can share image, sound, video, voice and many other features and to communicate with each under these tools. • Multimedia networking applications 1) stored streaming 2) live streaming 3) interactive, real-time • RTSP, RTCP, SIP, H.323
  • 13. TRINITY INSTITUTE OF PROFESSIONAL STUDIES Sector – 9, Dwarka Institutional Area, New Delhi-75 UNIT IV Network Security • Cryptographic Building Blocks There are various techniques for encrypting messages, for securely exchanging keys, for maintaining the integrity of messages, and for guaranteeing authenticity of a message. These tools can be thought of as building blocks to construct protection against attack. • Symmetric Key Encryption An encryption system in which the sender and receiver of a message share a single, common key that is used to encrypt and decrypt the message. Symmetric-key cryptography is sometimes called secret-key cryptography • Public Key Encryption A cryptographic system that uses two keys -- a public key known to everyone and a private or secret key known only to the recipient of the message. • Authentication protocols An authentication protocol is a type of cryptographic protocol with the purpose of authenticating entities wishing to communicate securely. Example Kerberos, Password Authentication Protocol (PAP), Extensible Authentication Protocol (EAP) • PGP • is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication. • TLS, SSL • Firewalls • Intrusion Detection
  • 14. TRINITY INSTITUTE OF PROFESSIONAL STUDIES Sector – 9, Dwarka Institutional Area, New Delhi-75 • REFERENCE BOOKS: • [R1] Computer Networking: A Top Down Approach (Fifth Edition), James F. Kurose • W. Stallings, Networks Security Essentials: Application & Standards, Pearson Education, 2000
  翻译: