SlideShare a Scribd company logo
3
Most read
5
Most read
14
Most read
TRINITY INSTITUTE OF PROFESSIONAL STUDIES
Sector – 9, Dwarka Institutional Area, New Delhi-75
Affiliated Institution of G.G.S.IP.U, Delhi
ADVANCED COMPUTER
NETWORK -20304
ACN
TRINITY INSTITUTE OF PROFESSIONAL STUDIES
Sector – 9, Dwarka Institutional Area, New Delhi-75
Affiliated Institution of G.G.S.IP.U, Delhi
Advanced computer network
ACN-20304
TRINITY INSTITUTE OF PROFESSIONAL STUDIES
Sector – 9, Dwarka Institutional Area, New Delhi-75
Network
• A network is a connected collection of devices
and end systems, such as computers and servers,
that can communicate with each other.
• Networks carry data in many types of
environments, including homes, small businesses,
and large enterprises. In a large enterprise, a
number of locations might need to communicate
with each other, and you can describe those
locations as follows
TRINITY INSTITUTE OF PROFESSIONAL STUDIES
Sector – 9, Dwarka Institutional Area, New Delhi-75
Locations
• Main office:
• Remote locations
• Branch offices:
• Home offices:
• Mobile users
TRINITY INSTITUTE OF PROFESSIONAL STUDIES
Sector – 9, Dwarka Institutional Area, New Delhi-75
Resource-Sharing Functions and
Benefits
• The main functions of computer networks in
business today are to simplify and streamline
business processes through the use of data and
application sharing. Networks enable end users
to share both information and hardware
resources. By providing this interconnection
between the users and common sets of data,
businesses can make more efficient use of their
resources. The major resources that are shared in
a computer network include the following:
TRINITY INSTITUTE OF PROFESSIONAL STUDIES
Sector – 9, Dwarka Institutional Area, New Delhi-75
Resource sharing
• Data and applications: When users are connected through a network,
they can share files and even software application programs, making data
more easily available and promoting more efficient collaboration on work
projects.
• Physical resources: The resources that can be shared include both input
devices, such as cameras, and output devices, such as printers.
• Network storage: Today the network makes storage available to users in
several ways. Direct attached storage (DAS) directly connects physical
storage to a PC or a shared server. Network attached storage (NAS) makes
storage available through a special network appliance. Finally, storage area
networks (SAN) provide a network of storage devices.
• Backup devices: A network can also include backup devices, such as tape
drives, that provide a central means to save files from multiple computers.
Network storage is also used to provide archive capability, business
continuance, and disaster recovery.
TRINITY INSTITUTE OF PROFESSIONAL STUDIES
Sector – 9, Dwarka Institutional Area, New Delhi-75
TRINITY INSTITUTE OF PROFESSIONAL STUDIES
Sector – 9, Dwarka Institutional Area, New Delhi-75
Network User Applications
• E-mail: E-mail is a valuable application for most network users. Users can communicate information (messages and
files) electronically in a timely manner, to not only other users in the same network but also other users outside the
network (suppliers, information resources, and customers, for example). Examples of e-mail programs include
Microsoft Outlook and Eudora by Qualcomm.
• Web browser: A web browser enables access to the Internet through a common interface. The Internet provides a
wealth of information and has become vital to the productivity of both home and business users. Communicating with
suppliers and customers, handling orders and fulfillment, and locating information are now routinely done
electronically over the Internet, which saves time and increases overall productivity. The most commonly used
browsers are Microsoft Internet Explorer, Netscape Navigator, Mozilla, and Firefox.
• Instant messaging: Instant messaging started in the personal user-to-user space; however, it soon provided
considerable benefit in the corporate world. Now many instant messaging applications, such as those provided by AOL
and Yahoo!, provide data encryption and logging, features essential for corporate use.
• Collaboration: Working together as individuals or groups is greatly facilitated when the collaborators are on a
network. Individuals creating separate parts of an annual report or a business plan, for example, can either transmit
their data files to a central resource for compilation or use a workgroup software application to create and modify the
entire document, without any exchange of paper. One of the best-known traditional collaboration software programs is
Lotus Notes. A more modern web-based collaboration application is a wiki.
• Database: This type of application enables users on a network to store information in central locations (such as
storage devices) so that others on the network can easily retrieve selected information in the formats that are most
useful to them. Some of the most common databases used in enterprises today are Oracle and Microsoft SQL Server.
TRINITY INSTITUTE OF PROFESSIONAL STUDIES
Sector – 9, Dwarka Institutional Area, New Delhi-75
Characteristics of a Network
• Speed: Speed is a measure of how fast data is transmitted over the network. A more precise term would be data rate.
• Cost: Cost indicates the general cost of components, installation, and maintenance of the network.
• Security: Security indicates how secure the network is, including the data that is transmitted over the network. The
subject of security is important and constantly evolving. You should consider security whenever you take actions that affect
the network.
• Availability: Availability is a measure of the probability that the network will be available for use when required. For
networks that are meant to be used 24 hours a day, 7 days a week, 365 days a year, availability is calculated by dividing the
time it is actually available by the total time in a year and then multiplying by 100 to get a percentage.
• Scalability: Scalability indicates how well the network can accommodate more users and data transmission
requirements. If a network is designed and optimized for just the current requirements, it can be very expensive and
difficult to meet new needs when the network grows.
• Reliability: Reliability indicates the dependability of the components (routers, switches, PCs, and so on) that make up
the network. Reliability is often measured as a probability of failure, or mean time between failures (MTBF).
• Topology: Networks have two types of topologies: the physical topology, which is the arrangement of the cable, network
devices, and end systems (PCs and servers), and the logical topology, which is the path that the data signals take through
the physical topology.
TRINITY INSTITUTE OF PROFESSIONAL STUDIES
Sector – 9, Dwarka Institutional Area, New Delhi-75
Unit – I
Foundation
• Building network
• framing error detection
In serial communications, a framing error is the result of reading a string of symbols which are grouped in blocks at
the wrong starting point.
• Reliable transmission
• Ethernet &MAC Internetworking
A networking interface allows a computer or mobile device to connect to a local area network
(LAN) using Ethernet as the transmission mechanism.
• Switching & Bridging
• Basic Internetworking
• Routing
Routing is usually performed by a dedicated device called a router. It provide best
and shortest path to data on the network
TRINITY INSTITUTE OF PROFESSIONAL STUDIES
Sector – 9, Dwarka Institutional Area, New Delhi-75
Unit-II
Advance Internetworking
• The global Internet
• Multicast
To transmit a single message to a select group of recipients.
• MPLS(Multiprotocol Label Switching)
MPLS gives network operators a great deal of flexibility to divert and route traffic
around link failures, congestion, and bottlenecks.
• Routing among mobile Devices
• Simple Demultiplexer
A multiplexer accepts two (or more) streams of data and combines them into one stream. The mixed data streams must be separated. This is
done by demultiplexers.
• Reliable Byte Stream (TCP)
A byte stream is a bit stream, in which data bits are grouped into units, called bytes.
Reliable delivery of byte stream by TCP.
• RPC(remote procedure call)
RPC is a powerful technique for constructing distributed, client-server based applications.
• RTP
The Real-time Transport Protocol (RTP) defines a standardized packet format for delivering audio and video over IP networks. RTP is used
extensively in communication and entertainment systems that involve streaming media, such as telephony, video teleconference
applications, television services and web-based push-to-talk features.
TRINITY INSTITUTE OF PROFESSIONAL STUDIES
Sector – 9, Dwarka Institutional Area, New Delhi-75
UNIT III
Congestion Control & Resource Allocation
• TCP CongestionControl Avoidance mechanisms
• Quality of Service.
• Multimedia Networking
Using networks different users on different machines can share image, sound,
video, voice and many other features and to communicate with each under these
tools.
• Multimedia networking applications
1) stored streaming
2) live streaming
3) interactive, real-time
• RTSP, RTCP, SIP, H.323
TRINITY INSTITUTE OF PROFESSIONAL STUDIES
Sector – 9, Dwarka Institutional Area, New Delhi-75
UNIT IV
Network Security
• Cryptographic Building Blocks
There are various techniques for encrypting messages, for securely exchanging keys, for maintaining the integrity of
messages, and for guaranteeing authenticity of a message. These tools can be thought of as building blocks to
construct protection against attack.
• Symmetric Key Encryption
An encryption system in which the sender and receiver of a message share a single, common key that is used to encrypt and
decrypt the message. Symmetric-key cryptography is sometimes called secret-key cryptography
• Public Key Encryption
A cryptographic system that uses two keys -- a public key known to everyone and a private or secret key known only
to the recipient of the message.
• Authentication protocols
An authentication protocol is a type of cryptographic protocol with the purpose of authenticating entities wishing
to communicate securely. Example Kerberos, Password Authentication Protocol (PAP), Extensible Authentication Protocol (EAP)
• PGP
• is a data encryption and decryption computer program that provides cryptographic
privacy and authentication for data communication.
• TLS, SSL
• Firewalls
• Intrusion Detection
TRINITY INSTITUTE OF PROFESSIONAL STUDIES
Sector – 9, Dwarka Institutional Area, New Delhi-75
• REFERENCE BOOKS:
• [R1] Computer Networking: A Top Down
Approach (Fifth Edition), James F. Kurose
• W. Stallings, Networks Security Essentials:
Application & Standards, Pearson Education,
2000

More Related Content

PPTX
Advance Networking Course Details PPT
PSK Technolgies Pvt. Ltd. IT Company Nagpur
 
PDF
Networking Technologies Basic's complete notes
IndrajaMeghavathula
 
PDF
Peer- to -peer connection using ciscio packet tracer
JalalMiah5
 
PPTX
Basics of Computer Network Device
Rubal Sagwal
 
PPTX
Unit 1
Baskarkncet
 
PPTX
Computer Network Complete Introduction
Ahmar Hashmi
 
PPT
Components of client server application
Ashwin Ananthapadmanabhan
 
PDF
Computer Networking Notes APNA COLLEGE.pdf
GAURAVJOSHI782157
 
Advance Networking Course Details PPT
PSK Technolgies Pvt. Ltd. IT Company Nagpur
 
Networking Technologies Basic's complete notes
IndrajaMeghavathula
 
Peer- to -peer connection using ciscio packet tracer
JalalMiah5
 
Basics of Computer Network Device
Rubal Sagwal
 
Unit 1
Baskarkncet
 
Computer Network Complete Introduction
Ahmar Hashmi
 
Components of client server application
Ashwin Ananthapadmanabhan
 
Computer Networking Notes APNA COLLEGE.pdf
GAURAVJOSHI782157
 

What's hot (20)

PPTX
Ppt of types of-network
Darshit narechania
 
PPT
Networking ppt
Shovan Mandal
 
PPT
network hardware
tumetr1
 
PPT
Network administration and Management
Bry Cunal
 
PPT
Introduction of computer network
Vivek Kumar Sinha
 
PPTX
Computer networking devices
Rajesh Sadhukha
 
PPTX
Network Hardware And Software
Steven Cahill
 
PPT
Networking concepts
seemadav1
 
PPTX
Basic Networking Concepts
Sehajbir Singh
 
PPT
Network Security
MAJU
 
PPT
Basics of Networks ,Advantages and Disadvantages
sabari Giri
 
PPTX
Computer network
Rahul Das
 
PPT
Computer network ppt
Santosh Delwar
 
PPTX
Network security
quest university nawabshah
 
ODP
Basic's of internet
Poovarasan Shanmugasundaram
 
PPTX
Reference models in Networks: OSI & TCP/IP
Mukesh Chinta
 
PPS
Network ppt
hlalu861
 
PPTX
The Basics of Computer Networking
Global Knowledge Training
 
PDF
Web technology
Selvin Josy Bai Somu
 
Ppt of types of-network
Darshit narechania
 
Networking ppt
Shovan Mandal
 
network hardware
tumetr1
 
Network administration and Management
Bry Cunal
 
Introduction of computer network
Vivek Kumar Sinha
 
Computer networking devices
Rajesh Sadhukha
 
Network Hardware And Software
Steven Cahill
 
Networking concepts
seemadav1
 
Basic Networking Concepts
Sehajbir Singh
 
Network Security
MAJU
 
Basics of Networks ,Advantages and Disadvantages
sabari Giri
 
Computer network
Rahul Das
 
Computer network ppt
Santosh Delwar
 
Network security
quest university nawabshah
 
Basic's of internet
Poovarasan Shanmugasundaram
 
Reference models in Networks: OSI & TCP/IP
Mukesh Chinta
 
Network ppt
hlalu861
 
The Basics of Computer Networking
Global Knowledge Training
 
Web technology
Selvin Josy Bai Somu
 
Ad

Viewers also liked (20)

PPTX
BASIC TO ADVANCED NETWORKING TUTORIALS
Varinder Singh Walia
 
PPT
Basic To Advanced Networking
Beth Bridges Author, Speaker, Technology Marketer
 
PPT
BASIC CONCEPTS OF COMPUTER NETWORKS
Kak Yong
 
PPTX
Dynamic routing protocols (CCNA)
Varinder Singh Walia
 
PPT
Networking fundamentals
jpprakash
 
PPTX
Introduction to computer network
Ashita Agrawal
 
PPTX
Crc
CHINTAN Patel
 
PPT
1. computer networks u1 ver 1.0
Dr. C.V. Suresh Babu
 
PPT
Advance hardware devices
Varinder Singh Walia
 
PPTX
Ethertnet data transfer.ppt
Mantra VLSI
 
PPTX
CRC Error coding technique
Mantra VLSI
 
PPTX
20 common ports and their purposes
Owlishes
 
PPTX
Well known protocols port numbers
Varinder Singh Walia
 
PPTX
Voice over internet protocol
Varinder Singh Walia
 
PDF
CCN -UNIT 1 PDF Notes for 7th EC
SURESHA V
 
PPTX
Acn presentation
rizgohar
 
PDF
The 20 Common ports
RKabbaniFTW
 
PPTX
Presentation on cyclic redundancy check (crc)
Sudhanshu Srivastava
 
PPT
Introduction to Computer Networks
Ghaffar Khan
 
PPTX
Computer Network
AkShay Dhola
 
BASIC TO ADVANCED NETWORKING TUTORIALS
Varinder Singh Walia
 
BASIC CONCEPTS OF COMPUTER NETWORKS
Kak Yong
 
Dynamic routing protocols (CCNA)
Varinder Singh Walia
 
Networking fundamentals
jpprakash
 
Introduction to computer network
Ashita Agrawal
 
1. computer networks u1 ver 1.0
Dr. C.V. Suresh Babu
 
Advance hardware devices
Varinder Singh Walia
 
Ethertnet data transfer.ppt
Mantra VLSI
 
CRC Error coding technique
Mantra VLSI
 
20 common ports and their purposes
Owlishes
 
Well known protocols port numbers
Varinder Singh Walia
 
Voice over internet protocol
Varinder Singh Walia
 
CCN -UNIT 1 PDF Notes for 7th EC
SURESHA V
 
Acn presentation
rizgohar
 
The 20 Common ports
RKabbaniFTW
 
Presentation on cyclic redundancy check (crc)
Sudhanshu Srivastava
 
Introduction to Computer Networks
Ghaffar Khan
 
Computer Network
AkShay Dhola
 
Ad

Similar to Advanced computer network (20)

PPTX
Advanced computer network
Trinity Dwarka
 
PPTX
Computer Networks- Network Basics
Trinity Dwarka
 
PPTX
Computer Communications
Anbazhagan Ajaganandane
 
PDF
COMPUTER NETWORKS NOTES usefull for computer and elctronics students
Gorra Narsimhulu
 
PDF
COMPUTER NETWORKS NOTES.pdf
GyanendraSingh189549
 
PPT
Telecommunications systemsand networking
Online
 
PPTX
S5 MCE. UNIT 3 COMPUTER SCIENCE.pptx
CYIZAEmile
 
PDF
Fundamentals of Computer Networking
Pulkit Singhal
 
DOCX
Computer network
Anupan Jain
 
DOCX
Network fundamentals
Imoh Etuk
 
PPTX
Computer Networks.pptx
rocky781582
 
PPTX
Computer communication network
himz676987
 
PDF
SULTHAN's ICT-2 for UG courses
SULTHAN BASHA
 
PDF
Computer networks
MDHASNAIN23
 
PPTX
Network resources
Rohit Kumar
 
PDF
Basic lecture
Batzaya Dashdondog
 
PDF
Networking tutorial
ajaymane22
 
DOCX
Computer network note
MdAnikKhan
 
PPTX
Networking Bridge course_PPT.pptx
akshataharage
 
PPT
Chap006
Arshian Siddiqui
 
Advanced computer network
Trinity Dwarka
 
Computer Networks- Network Basics
Trinity Dwarka
 
Computer Communications
Anbazhagan Ajaganandane
 
COMPUTER NETWORKS NOTES usefull for computer and elctronics students
Gorra Narsimhulu
 
COMPUTER NETWORKS NOTES.pdf
GyanendraSingh189549
 
Telecommunications systemsand networking
Online
 
S5 MCE. UNIT 3 COMPUTER SCIENCE.pptx
CYIZAEmile
 
Fundamentals of Computer Networking
Pulkit Singhal
 
Computer network
Anupan Jain
 
Network fundamentals
Imoh Etuk
 
Computer Networks.pptx
rocky781582
 
Computer communication network
himz676987
 
SULTHAN's ICT-2 for UG courses
SULTHAN BASHA
 
Computer networks
MDHASNAIN23
 
Network resources
Rohit Kumar
 
Basic lecture
Batzaya Dashdondog
 
Networking tutorial
ajaymane22
 
Computer network note
MdAnikKhan
 
Networking Bridge course_PPT.pptx
akshataharage
 

More from Trinity Dwarka (20)

PPTX
Why BAJMC in Trinity Dwarka
Trinity Dwarka
 
PPTX
Career Options after BCA
Trinity Dwarka
 
PPTX
Principles of Management-Management-Concept & Meaning
Trinity Dwarka
 
PPTX
Principles of Management- Management Process & Functions
Trinity Dwarka
 
PPTX
Principles of Management- Managerial Levels & Roles-
Trinity Dwarka
 
PPTX
Management-Concept & Meaning
Trinity Dwarka
 
PPTX
Principles of Management- Planning
Trinity Dwarka
 
PPTX
Organizing Authority & Responsibility- Principles of Management
Trinity Dwarka
 
PPTX
Staffing- Principles of Management
Trinity Dwarka
 
PPTX
Directing-Principles of Management
Trinity Dwarka
 
PPTX
Dimensional Modelling-Data Warehouse & Data Mining
Trinity Dwarka
 
PPTX
Data Preprocessing- Data Warehouse & Data Mining
Trinity Dwarka
 
PPTX
Java Programming- Introduction to Java Applet Programs
Trinity Dwarka
 
PPTX
Linux Environment- Linux vs Unix
Trinity Dwarka
 
PPTX
Linux Environment- Linux Basics
Trinity Dwarka
 
PPTX
BCA-Mobile Computing- BASICS OF MOBILE COMPUTING
Trinity Dwarka
 
PPTX
INTRODUCTION TO INFORMATION TECHNOLOGY- IT Basics
Trinity Dwarka
 
PPTX
Database Management System
Trinity Dwarka
 
PPTX
JAVA PROGRAMMING- OOP Concept
Trinity Dwarka
 
PPTX
E-Commerce- Introduction to E-Commerce
Trinity Dwarka
 
Why BAJMC in Trinity Dwarka
Trinity Dwarka
 
Career Options after BCA
Trinity Dwarka
 
Principles of Management-Management-Concept & Meaning
Trinity Dwarka
 
Principles of Management- Management Process & Functions
Trinity Dwarka
 
Principles of Management- Managerial Levels & Roles-
Trinity Dwarka
 
Management-Concept & Meaning
Trinity Dwarka
 
Principles of Management- Planning
Trinity Dwarka
 
Organizing Authority & Responsibility- Principles of Management
Trinity Dwarka
 
Staffing- Principles of Management
Trinity Dwarka
 
Directing-Principles of Management
Trinity Dwarka
 
Dimensional Modelling-Data Warehouse & Data Mining
Trinity Dwarka
 
Data Preprocessing- Data Warehouse & Data Mining
Trinity Dwarka
 
Java Programming- Introduction to Java Applet Programs
Trinity Dwarka
 
Linux Environment- Linux vs Unix
Trinity Dwarka
 
Linux Environment- Linux Basics
Trinity Dwarka
 
BCA-Mobile Computing- BASICS OF MOBILE COMPUTING
Trinity Dwarka
 
INTRODUCTION TO INFORMATION TECHNOLOGY- IT Basics
Trinity Dwarka
 
Database Management System
Trinity Dwarka
 
JAVA PROGRAMMING- OOP Concept
Trinity Dwarka
 
E-Commerce- Introduction to E-Commerce
Trinity Dwarka
 

Recently uploaded (20)

PPTX
An introduction to Prepositions for beginners.pptx
drsiddhantnagine
 
PPTX
How to Close Subscription in Odoo 18 - Odoo Slides
Celine George
 
PPTX
How to Manage Leads in Odoo 18 CRM - Odoo Slides
Celine George
 
PPTX
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
PDF
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
PPTX
CDH. pptx
AneetaSharma15
 
PPTX
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
PPTX
Basics and rules of probability with real-life uses
ravatkaran694
 
PPTX
Kanban Cards _ Mass Action in Odoo 18.2 - Odoo Slides
Celine George
 
PPTX
Python-Application-in-Drug-Design by R D Jawarkar.pptx
Rahul Jawarkar
 
PPTX
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
PDF
Virat Kohli- the Pride of Indian cricket
kushpar147
 
PDF
RA 12028_ARAL_Orientation_Day-2-Sessions_v2.pdf
Seven De Los Reyes
 
DOCX
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
PPTX
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
PPTX
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
PPTX
Measures_of_location_-_Averages_and__percentiles_by_DR SURYA K.pptx
Surya Ganesh
 
PPTX
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
DOCX
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
DOCX
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
An introduction to Prepositions for beginners.pptx
drsiddhantnagine
 
How to Close Subscription in Odoo 18 - Odoo Slides
Celine George
 
How to Manage Leads in Odoo 18 CRM - Odoo Slides
Celine George
 
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
CDH. pptx
AneetaSharma15
 
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
Basics and rules of probability with real-life uses
ravatkaran694
 
Kanban Cards _ Mass Action in Odoo 18.2 - Odoo Slides
Celine George
 
Python-Application-in-Drug-Design by R D Jawarkar.pptx
Rahul Jawarkar
 
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
Virat Kohli- the Pride of Indian cricket
kushpar147
 
RA 12028_ARAL_Orientation_Day-2-Sessions_v2.pdf
Seven De Los Reyes
 
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
Measures_of_location_-_Averages_and__percentiles_by_DR SURYA K.pptx
Surya Ganesh
 
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 

Advanced computer network

  • 1. TRINITY INSTITUTE OF PROFESSIONAL STUDIES Sector – 9, Dwarka Institutional Area, New Delhi-75 Affiliated Institution of G.G.S.IP.U, Delhi ADVANCED COMPUTER NETWORK -20304 ACN
  • 2. TRINITY INSTITUTE OF PROFESSIONAL STUDIES Sector – 9, Dwarka Institutional Area, New Delhi-75 Affiliated Institution of G.G.S.IP.U, Delhi Advanced computer network ACN-20304
  • 3. TRINITY INSTITUTE OF PROFESSIONAL STUDIES Sector – 9, Dwarka Institutional Area, New Delhi-75 Network • A network is a connected collection of devices and end systems, such as computers and servers, that can communicate with each other. • Networks carry data in many types of environments, including homes, small businesses, and large enterprises. In a large enterprise, a number of locations might need to communicate with each other, and you can describe those locations as follows
  • 4. TRINITY INSTITUTE OF PROFESSIONAL STUDIES Sector – 9, Dwarka Institutional Area, New Delhi-75 Locations • Main office: • Remote locations • Branch offices: • Home offices: • Mobile users
  • 5. TRINITY INSTITUTE OF PROFESSIONAL STUDIES Sector – 9, Dwarka Institutional Area, New Delhi-75 Resource-Sharing Functions and Benefits • The main functions of computer networks in business today are to simplify and streamline business processes through the use of data and application sharing. Networks enable end users to share both information and hardware resources. By providing this interconnection between the users and common sets of data, businesses can make more efficient use of their resources. The major resources that are shared in a computer network include the following:
  • 6. TRINITY INSTITUTE OF PROFESSIONAL STUDIES Sector – 9, Dwarka Institutional Area, New Delhi-75 Resource sharing • Data and applications: When users are connected through a network, they can share files and even software application programs, making data more easily available and promoting more efficient collaboration on work projects. • Physical resources: The resources that can be shared include both input devices, such as cameras, and output devices, such as printers. • Network storage: Today the network makes storage available to users in several ways. Direct attached storage (DAS) directly connects physical storage to a PC or a shared server. Network attached storage (NAS) makes storage available through a special network appliance. Finally, storage area networks (SAN) provide a network of storage devices. • Backup devices: A network can also include backup devices, such as tape drives, that provide a central means to save files from multiple computers. Network storage is also used to provide archive capability, business continuance, and disaster recovery.
  • 7. TRINITY INSTITUTE OF PROFESSIONAL STUDIES Sector – 9, Dwarka Institutional Area, New Delhi-75
  • 8. TRINITY INSTITUTE OF PROFESSIONAL STUDIES Sector – 9, Dwarka Institutional Area, New Delhi-75 Network User Applications • E-mail: E-mail is a valuable application for most network users. Users can communicate information (messages and files) electronically in a timely manner, to not only other users in the same network but also other users outside the network (suppliers, information resources, and customers, for example). Examples of e-mail programs include Microsoft Outlook and Eudora by Qualcomm. • Web browser: A web browser enables access to the Internet through a common interface. The Internet provides a wealth of information and has become vital to the productivity of both home and business users. Communicating with suppliers and customers, handling orders and fulfillment, and locating information are now routinely done electronically over the Internet, which saves time and increases overall productivity. The most commonly used browsers are Microsoft Internet Explorer, Netscape Navigator, Mozilla, and Firefox. • Instant messaging: Instant messaging started in the personal user-to-user space; however, it soon provided considerable benefit in the corporate world. Now many instant messaging applications, such as those provided by AOL and Yahoo!, provide data encryption and logging, features essential for corporate use. • Collaboration: Working together as individuals or groups is greatly facilitated when the collaborators are on a network. Individuals creating separate parts of an annual report or a business plan, for example, can either transmit their data files to a central resource for compilation or use a workgroup software application to create and modify the entire document, without any exchange of paper. One of the best-known traditional collaboration software programs is Lotus Notes. A more modern web-based collaboration application is a wiki. • Database: This type of application enables users on a network to store information in central locations (such as storage devices) so that others on the network can easily retrieve selected information in the formats that are most useful to them. Some of the most common databases used in enterprises today are Oracle and Microsoft SQL Server.
  • 9. TRINITY INSTITUTE OF PROFESSIONAL STUDIES Sector – 9, Dwarka Institutional Area, New Delhi-75 Characteristics of a Network • Speed: Speed is a measure of how fast data is transmitted over the network. A more precise term would be data rate. • Cost: Cost indicates the general cost of components, installation, and maintenance of the network. • Security: Security indicates how secure the network is, including the data that is transmitted over the network. The subject of security is important and constantly evolving. You should consider security whenever you take actions that affect the network. • Availability: Availability is a measure of the probability that the network will be available for use when required. For networks that are meant to be used 24 hours a day, 7 days a week, 365 days a year, availability is calculated by dividing the time it is actually available by the total time in a year and then multiplying by 100 to get a percentage. • Scalability: Scalability indicates how well the network can accommodate more users and data transmission requirements. If a network is designed and optimized for just the current requirements, it can be very expensive and difficult to meet new needs when the network grows. • Reliability: Reliability indicates the dependability of the components (routers, switches, PCs, and so on) that make up the network. Reliability is often measured as a probability of failure, or mean time between failures (MTBF). • Topology: Networks have two types of topologies: the physical topology, which is the arrangement of the cable, network devices, and end systems (PCs and servers), and the logical topology, which is the path that the data signals take through the physical topology.
  • 10. TRINITY INSTITUTE OF PROFESSIONAL STUDIES Sector – 9, Dwarka Institutional Area, New Delhi-75 Unit – I Foundation • Building network • framing error detection In serial communications, a framing error is the result of reading a string of symbols which are grouped in blocks at the wrong starting point. • Reliable transmission • Ethernet &MAC Internetworking A networking interface allows a computer or mobile device to connect to a local area network (LAN) using Ethernet as the transmission mechanism. • Switching & Bridging • Basic Internetworking • Routing Routing is usually performed by a dedicated device called a router. It provide best and shortest path to data on the network
  • 11. TRINITY INSTITUTE OF PROFESSIONAL STUDIES Sector – 9, Dwarka Institutional Area, New Delhi-75 Unit-II Advance Internetworking • The global Internet • Multicast To transmit a single message to a select group of recipients. • MPLS(Multiprotocol Label Switching) MPLS gives network operators a great deal of flexibility to divert and route traffic around link failures, congestion, and bottlenecks. • Routing among mobile Devices • Simple Demultiplexer A multiplexer accepts two (or more) streams of data and combines them into one stream. The mixed data streams must be separated. This is done by demultiplexers. • Reliable Byte Stream (TCP) A byte stream is a bit stream, in which data bits are grouped into units, called bytes. Reliable delivery of byte stream by TCP. • RPC(remote procedure call) RPC is a powerful technique for constructing distributed, client-server based applications. • RTP The Real-time Transport Protocol (RTP) defines a standardized packet format for delivering audio and video over IP networks. RTP is used extensively in communication and entertainment systems that involve streaming media, such as telephony, video teleconference applications, television services and web-based push-to-talk features.
  • 12. TRINITY INSTITUTE OF PROFESSIONAL STUDIES Sector – 9, Dwarka Institutional Area, New Delhi-75 UNIT III Congestion Control & Resource Allocation • TCP CongestionControl Avoidance mechanisms • Quality of Service. • Multimedia Networking Using networks different users on different machines can share image, sound, video, voice and many other features and to communicate with each under these tools. • Multimedia networking applications 1) stored streaming 2) live streaming 3) interactive, real-time • RTSP, RTCP, SIP, H.323
  • 13. TRINITY INSTITUTE OF PROFESSIONAL STUDIES Sector – 9, Dwarka Institutional Area, New Delhi-75 UNIT IV Network Security • Cryptographic Building Blocks There are various techniques for encrypting messages, for securely exchanging keys, for maintaining the integrity of messages, and for guaranteeing authenticity of a message. These tools can be thought of as building blocks to construct protection against attack. • Symmetric Key Encryption An encryption system in which the sender and receiver of a message share a single, common key that is used to encrypt and decrypt the message. Symmetric-key cryptography is sometimes called secret-key cryptography • Public Key Encryption A cryptographic system that uses two keys -- a public key known to everyone and a private or secret key known only to the recipient of the message. • Authentication protocols An authentication protocol is a type of cryptographic protocol with the purpose of authenticating entities wishing to communicate securely. Example Kerberos, Password Authentication Protocol (PAP), Extensible Authentication Protocol (EAP) • PGP • is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication. • TLS, SSL • Firewalls • Intrusion Detection
  • 14. TRINITY INSTITUTE OF PROFESSIONAL STUDIES Sector – 9, Dwarka Institutional Area, New Delhi-75 • REFERENCE BOOKS: • [R1] Computer Networking: A Top Down Approach (Fifth Edition), James F. Kurose • W. Stallings, Networks Security Essentials: Application & Standards, Pearson Education, 2000