This document provides an introduction to computer networks. It discusses the basics of LANs, MANs and WANs. It describes common network topologies like bus, star, ring and mesh. It also discusses the various components that make up a network including physical media, networking devices, computers, networking software and applications. The document is intended to provide a high-level overview of computer networks.
This document provides an introduction to computer networks presented by Navpreet Singh, the Network Manager at IIT Kanpur. It discusses the basics of computer networks including definitions, applications, topologies, components, protocols, and networking applications. The course content includes 16 lectures and 8 labs covering topics such as the OSI model, physical media, LAN and WAN technologies, IP addressing, routing, and practical configurations.
This document provides an overview of the "Computer Networks and Data Communications" course offered at Must.ac.ug. The course is taught on Thursdays from 11:00-12:30pm in the Post Graduate Room1. Students are expected to attend all lectures, complete assignments and projects, and participate in discussions. Prerequisites include basic computer skills and knowledge of the Internet. Students will access course materials through the learning management system using the enrollment key 3114. Evaluation includes in-class assignments, a midterm test, group projects, attendance, and a final exam. The semester project involves designing a campus network using Packet Tracer. Topics covered include networking fundamentals, OSI and TCP/IP models, physical
The document provides an introduction to computer networks. It discusses network topologies including bus, star, tree, ring and mesh. It describes the components of a network including physical media, networking devices, computers that can serve as clients or servers, networking protocols like TCP/IP, and applications like email, the web, and video conferencing. It also introduces concepts like LANs, MANs, WANs and the ISO/OSI reference model. The document appears to be an introductory lecture on computer networks covering fundamental topics at a high level.
This document describes a network design project for a university campus implemented using Cisco Packet Tracer. The network incorporates various protocols including VLAN, DNS, DHCP, HSRP, FTP, email services, OSPF, and Internet of Things (IoT) technologies to connect devices on the campus network. Python and JavaScript were used as programming languages, and the network was simulated using Cisco Packet Tracer. The results demonstrated functionality of key network services and communication between endpoints on the LAN and WAN. Future work is proposed to implement software-defined networking (SDN) for greater reliability, efficiency, cost savings and scalability of the campus network.
This document provides an introduction to computer networks. It defines what a computer network is and different types of networks like LAN, MAN, and WAN. It describes common network topologies like bus, star, ring, and mesh. It also discusses the key components of a network like physical media, networking devices, computers, networking software, and applications. Finally, it provides an overview of TCP/IP as the main networking protocol.
Case Study - After establishing a reputation in the Arts and Design Markets, the Singapore Arts Academy (SAA) considers expanding and investing into a new Multimedia department and courses by setting up campuses around Asia pacific region. - By Hansa Edirisinghe
This document provides an overview of high speed backbone network design and routing. It discusses key elements of backbone networks including fiber optics, layer 2 and 3 switches, dense wavelength division multiplexing (DWDM), quality of service measures, and resilience. Fiber optic cables provide benefits like high bandwidth, low loss, and security. Layer 2 switches operate at the data link layer, while layer 3 switches perform both layer 2 and layer 3 functions for improved performance. DWDM combines multiple light wavelengths on a single fiber to increase bandwidth. Quality of service and resilience features ensure high throughput and network stability.
The document discusses computer networks and network architecture. It begins with an introduction to computer networks, defining LAN, MAN and WAN. It then discusses network topologies like bus, star, ring and mesh. It also covers network components like physical media, devices, computers and applications. The document then discusses network architecture, specifically covering the OSI model and TCP/IP model. It also provides details on Ethernet, direct link networks including encoding, framing, error detection and transmission.
This document presents a LAN design project report for an organization with 70 users. It proposes a network with wired and wireless connectivity using Ethernet cables, switches, a router and access points. A central data server would be installed with antivirus software and connected to the network along with a DHCP server for dynamic IP address allocation. The network diagram and configurations are presented, along with the hardware, software and design guidelines required to implement the LAN.
This document provides an overview and syllabus for a computer networking course. It will take a top-down approach, beginning with what services distributed applications require from networks and how networks provide those services. The course will cover topics including network edge, access, and core; delay, loss and throughput; protocol layers and models; network programming; and the application, transport, network, link and physical layers of the TCP/IP stack. The instructor is Dr. Nauman Mazhar and the course will include lectures, assignments, quizzes, and exams.
The document provides an overview of computer networking fundamentals including:
- The seven layers of the OSI reference model and their functions from physical transmission to application interfaces.
- Reasons for using a layered networking model including modularity, interoperability, and error checking.
- Key networking concepts such as MAC addresses, connection-oriented vs. connectionless transmission, and data encapsulation.
The document provides an overview of networking technologies and concepts covered during a summer training program. It discusses network topologies including physical, logical and different types of networks. It also covers networking devices like routers, switches and cables. Concepts like IP addressing, classes, subnetting, VLANs and routing are explained. The training took place at HCL Career Development Centre and involved projects on addressing schemes, internet connections and configuration of switches and routers.
The document discusses technologies and concepts related to wide area networks (WAN). It begins by defining WAN as a collection of LANs, MANs, and workgroups connected using communication devices and the internet. It then covers WAN characteristics, benefits, services, equipment, topologies, and physical standards. Several data link protocols used in WANs are also explained, including SDLC, HDLC, PPP, X.25, Frame Relay, ISDN, and ATM. The role of standards bodies in WAN standardization is briefly mentioned.
Bangladesh Computer Council Networking ProjectMDMusab
The document summarizes a student project to design the computer network for the Bangladesh Computer Council building. It includes logical and physical network diagrams connecting 8 floors and various rooms using different topologies. A bill of materials is provided listing the required equipment such as switches, routers, servers, and their estimated costs, totaling approximately 39.15 million BDT. Security measures are discussed like encryption, firewalls, and access control. Assembly and disassembly photos demonstrate how to build a computer. The project aimed to provide a reliable, secure, and fault-tolerant network for the government agency.
The document discusses the CCNA certification exam including details about the exam such as number of questions, duration, passing score, and benefits of obtaining the certification. It also provides an overview of networking concepts including the purpose of networking, networking devices, network interface cards, hubs, switches, routers, network topologies, LANs/WANs, virtual private networks, bandwidth, the OSI model, and IEEE 802 standards.
The document discusses the CCNA certification exam including details about the exam such as number of questions, duration, passing score, and benefits of obtaining the certification. It also provides information about networking devices, topologies, protocols, and the OSI model layers. Key topics covered include switches, routers, network topologies like star and bus, the 7 layers of the OSI model and what each layer is responsible for, and how data is encapsulated as it moves through the layers from physical to application.
The document discusses the CCNA certification exam including details about the exam such as number of questions, duration, passing score, and benefits of obtaining the certification. It also provides information about networking devices, topologies, standards, and the OSI model layers. Key topics covered include switches, routers, network topologies like star and bus, IEEE 802 standards, and an explanation of each of the seven layers of the OSI model.
The document discusses the CCNA certification exam and provides details about its format, benefits, and requirements. It then covers networking concepts like network devices, topologies, protocols, and the OSI model. Key points include that the CCNA exam tests knowledge of networking fundamentals, has multiple choice and simulation questions, and benefits career advancement. It also defines common network components, topologies, and each layer of the OSI model.
Network system on Ahsanullah University of Science & TechnologyManas Saha
This document provides an overview of the network system at Ahsanullah University of Science & Technology (AUST) in Bangladesh. It describes the types of networks, topologies, hardware, and media used. The university uses both wired and wireless networks to connect computers. The wired network uses UTP and fiber optic cables in a star topology. Routers, switches, and servers connect the departments and buildings. The wireless network provides internet access across campus. In total, the network system at AUST effectively connects computers to share resources while managing bandwidth usage.
Experimental analysis of channel interference in ad hoc networkijcsa
In recent times, the use of ad hoc networks is a common research area among a researcher. Designing an
efficient and reliable network is not easy task. Network engineer faces many problems at the time of
deploying a network such as interference; Signal coverage, proper location of access point etc. channel
interference in one of them which must be considered at the time of deploying WLAN indoor environments
because channel interference impacts the network throughput and degrade the network performance.
In this experiment, we design a two WLAN BSS1 and BSS2 and investigate the impact of interference on
nodes. BSS1 contains three FTP clients and BSS2 contains two FTP client and their jobs is to upload data
to FTP Server Initially, they are far from each other. BSS1 moves toward BSS2 and after some time at
particular position both BSSs overlaps to each other. When BSSs overlaps to each other interference is
high and decrease network performance and increase upload time.
The document summarizes Mohammad Saidul Islam's presentation on his 3-month industrial attachment program at Flora Limited. It provides details on Flora Limited, including that it is the largest IT supplier in Bangladesh. It describes Mohammad's responsibilities, which involved learning about enterprise network design, meeting with customers, and preparing network diagrams and product lists. It outlines some of the key topics Mohammad learned, such as network topologies, VLANs, security architectures, and how his university studies helped him understand the work. It includes an example project where Mohammad designed the network for a customer's datacenter and head office network.
What is Computer Network ?
A Computer network is a set of nodes connected by communication links.
A node can be a computer, printer or any other device capable of sending/ receiving data generated by other nodes in the network.
What is Computer Network ?
A Computer network is a set of nodes connected by communication links.
A node can be a computer, printer or any other device capable of sending/ receiving data generated by other nodes in the network.
We introduce the Gaussian process (GP) modeling module developed within the UQLab software framework. The novel design of the GP-module aims at providing seamless integration of GP modeling into any uncertainty quantification workflow, as well as a standalone surrogate modeling tool. We first briefly present the key mathematical tools on the basis of GP modeling (a.k.a. Kriging), as well as the associated theoretical and computational framework. We then provide an extensive overview of the available features of the software and demonstrate its flexibility and user-friendliness. Finally, we showcase the usage and the performance of the software on several applications borrowed from different fields of engineering. These include a basic surrogate of a well-known analytical benchmark function; a hierarchical Kriging example applied to wind turbine aero-servo-elastic simulations and a more complex geotechnical example that requires a non-stationary, user-defined correlation function. The GP-module, like the rest of the scientific code that is shipped with UQLab, is open source (BSD license).
ELectronics Boards & Product Testing_Shiju.pdfShiju Jacob
This presentation provides a high level insight about DFT analysis and test coverage calculation, finalizing test strategy, and types of tests at different levels of the product.
Ad
More Related Content
Similar to lecture ON COMPUTER NETWORKING WORKSHOP.ppt (20)
This document provides an introduction to computer networks. It defines what a computer network is and different types of networks like LAN, MAN, and WAN. It describes common network topologies like bus, star, ring, and mesh. It also discusses the key components of a network like physical media, networking devices, computers, networking software, and applications. Finally, it provides an overview of TCP/IP as the main networking protocol.
Case Study - After establishing a reputation in the Arts and Design Markets, the Singapore Arts Academy (SAA) considers expanding and investing into a new Multimedia department and courses by setting up campuses around Asia pacific region. - By Hansa Edirisinghe
This document provides an overview of high speed backbone network design and routing. It discusses key elements of backbone networks including fiber optics, layer 2 and 3 switches, dense wavelength division multiplexing (DWDM), quality of service measures, and resilience. Fiber optic cables provide benefits like high bandwidth, low loss, and security. Layer 2 switches operate at the data link layer, while layer 3 switches perform both layer 2 and layer 3 functions for improved performance. DWDM combines multiple light wavelengths on a single fiber to increase bandwidth. Quality of service and resilience features ensure high throughput and network stability.
The document discusses computer networks and network architecture. It begins with an introduction to computer networks, defining LAN, MAN and WAN. It then discusses network topologies like bus, star, ring and mesh. It also covers network components like physical media, devices, computers and applications. The document then discusses network architecture, specifically covering the OSI model and TCP/IP model. It also provides details on Ethernet, direct link networks including encoding, framing, error detection and transmission.
This document presents a LAN design project report for an organization with 70 users. It proposes a network with wired and wireless connectivity using Ethernet cables, switches, a router and access points. A central data server would be installed with antivirus software and connected to the network along with a DHCP server for dynamic IP address allocation. The network diagram and configurations are presented, along with the hardware, software and design guidelines required to implement the LAN.
This document provides an overview and syllabus for a computer networking course. It will take a top-down approach, beginning with what services distributed applications require from networks and how networks provide those services. The course will cover topics including network edge, access, and core; delay, loss and throughput; protocol layers and models; network programming; and the application, transport, network, link and physical layers of the TCP/IP stack. The instructor is Dr. Nauman Mazhar and the course will include lectures, assignments, quizzes, and exams.
The document provides an overview of computer networking fundamentals including:
- The seven layers of the OSI reference model and their functions from physical transmission to application interfaces.
- Reasons for using a layered networking model including modularity, interoperability, and error checking.
- Key networking concepts such as MAC addresses, connection-oriented vs. connectionless transmission, and data encapsulation.
The document provides an overview of networking technologies and concepts covered during a summer training program. It discusses network topologies including physical, logical and different types of networks. It also covers networking devices like routers, switches and cables. Concepts like IP addressing, classes, subnetting, VLANs and routing are explained. The training took place at HCL Career Development Centre and involved projects on addressing schemes, internet connections and configuration of switches and routers.
The document discusses technologies and concepts related to wide area networks (WAN). It begins by defining WAN as a collection of LANs, MANs, and workgroups connected using communication devices and the internet. It then covers WAN characteristics, benefits, services, equipment, topologies, and physical standards. Several data link protocols used in WANs are also explained, including SDLC, HDLC, PPP, X.25, Frame Relay, ISDN, and ATM. The role of standards bodies in WAN standardization is briefly mentioned.
Bangladesh Computer Council Networking ProjectMDMusab
The document summarizes a student project to design the computer network for the Bangladesh Computer Council building. It includes logical and physical network diagrams connecting 8 floors and various rooms using different topologies. A bill of materials is provided listing the required equipment such as switches, routers, servers, and their estimated costs, totaling approximately 39.15 million BDT. Security measures are discussed like encryption, firewalls, and access control. Assembly and disassembly photos demonstrate how to build a computer. The project aimed to provide a reliable, secure, and fault-tolerant network for the government agency.
The document discusses the CCNA certification exam including details about the exam such as number of questions, duration, passing score, and benefits of obtaining the certification. It also provides an overview of networking concepts including the purpose of networking, networking devices, network interface cards, hubs, switches, routers, network topologies, LANs/WANs, virtual private networks, bandwidth, the OSI model, and IEEE 802 standards.
The document discusses the CCNA certification exam including details about the exam such as number of questions, duration, passing score, and benefits of obtaining the certification. It also provides information about networking devices, topologies, protocols, and the OSI model layers. Key topics covered include switches, routers, network topologies like star and bus, the 7 layers of the OSI model and what each layer is responsible for, and how data is encapsulated as it moves through the layers from physical to application.
The document discusses the CCNA certification exam including details about the exam such as number of questions, duration, passing score, and benefits of obtaining the certification. It also provides information about networking devices, topologies, standards, and the OSI model layers. Key topics covered include switches, routers, network topologies like star and bus, IEEE 802 standards, and an explanation of each of the seven layers of the OSI model.
The document discusses the CCNA certification exam and provides details about its format, benefits, and requirements. It then covers networking concepts like network devices, topologies, protocols, and the OSI model. Key points include that the CCNA exam tests knowledge of networking fundamentals, has multiple choice and simulation questions, and benefits career advancement. It also defines common network components, topologies, and each layer of the OSI model.
Network system on Ahsanullah University of Science & TechnologyManas Saha
This document provides an overview of the network system at Ahsanullah University of Science & Technology (AUST) in Bangladesh. It describes the types of networks, topologies, hardware, and media used. The university uses both wired and wireless networks to connect computers. The wired network uses UTP and fiber optic cables in a star topology. Routers, switches, and servers connect the departments and buildings. The wireless network provides internet access across campus. In total, the network system at AUST effectively connects computers to share resources while managing bandwidth usage.
Experimental analysis of channel interference in ad hoc networkijcsa
In recent times, the use of ad hoc networks is a common research area among a researcher. Designing an
efficient and reliable network is not easy task. Network engineer faces many problems at the time of
deploying a network such as interference; Signal coverage, proper location of access point etc. channel
interference in one of them which must be considered at the time of deploying WLAN indoor environments
because channel interference impacts the network throughput and degrade the network performance.
In this experiment, we design a two WLAN BSS1 and BSS2 and investigate the impact of interference on
nodes. BSS1 contains three FTP clients and BSS2 contains two FTP client and their jobs is to upload data
to FTP Server Initially, they are far from each other. BSS1 moves toward BSS2 and after some time at
particular position both BSSs overlaps to each other. When BSSs overlaps to each other interference is
high and decrease network performance and increase upload time.
The document summarizes Mohammad Saidul Islam's presentation on his 3-month industrial attachment program at Flora Limited. It provides details on Flora Limited, including that it is the largest IT supplier in Bangladesh. It describes Mohammad's responsibilities, which involved learning about enterprise network design, meeting with customers, and preparing network diagrams and product lists. It outlines some of the key topics Mohammad learned, such as network topologies, VLANs, security architectures, and how his university studies helped him understand the work. It includes an example project where Mohammad designed the network for a customer's datacenter and head office network.
What is Computer Network ?
A Computer network is a set of nodes connected by communication links.
A node can be a computer, printer or any other device capable of sending/ receiving data generated by other nodes in the network.
What is Computer Network ?
A Computer network is a set of nodes connected by communication links.
A node can be a computer, printer or any other device capable of sending/ receiving data generated by other nodes in the network.
We introduce the Gaussian process (GP) modeling module developed within the UQLab software framework. The novel design of the GP-module aims at providing seamless integration of GP modeling into any uncertainty quantification workflow, as well as a standalone surrogate modeling tool. We first briefly present the key mathematical tools on the basis of GP modeling (a.k.a. Kriging), as well as the associated theoretical and computational framework. We then provide an extensive overview of the available features of the software and demonstrate its flexibility and user-friendliness. Finally, we showcase the usage and the performance of the software on several applications borrowed from different fields of engineering. These include a basic surrogate of a well-known analytical benchmark function; a hierarchical Kriging example applied to wind turbine aero-servo-elastic simulations and a more complex geotechnical example that requires a non-stationary, user-defined correlation function. The GP-module, like the rest of the scientific code that is shipped with UQLab, is open source (BSD license).
ELectronics Boards & Product Testing_Shiju.pdfShiju Jacob
This presentation provides a high level insight about DFT analysis and test coverage calculation, finalizing test strategy, and types of tests at different levels of the product.
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptxRishavKumar530754
LiDAR-Based System for Autonomous Cars
Autonomous Driving with LiDAR Tech
LiDAR Integration in Self-Driving Cars
Self-Driving Vehicles Using LiDAR
LiDAR Mapping for Driverless Cars
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...Infopitaara
A feed water heater is a device used in power plants to preheat water before it enters the boiler. It plays a critical role in improving the overall efficiency of the power generation process, especially in thermal power plants.
🔧 Function of a Feed Water Heater:
It uses steam extracted from the turbine to preheat the feed water.
This reduces the fuel required to convert water into steam in the boiler.
It supports Regenerative Rankine Cycle, increasing plant efficiency.
🔍 Types of Feed Water Heaters:
Open Feed Water Heater (Direct Contact)
Steam and water come into direct contact.
Mixing occurs, and heat is transferred directly.
Common in low-pressure stages.
Closed Feed Water Heater (Surface Type)
Steam and water are separated by tubes.
Heat is transferred through tube walls.
Common in high-pressure systems.
⚙️ Advantages:
Improves thermal efficiency.
Reduces fuel consumption.
Lowers thermal stress on boiler components.
Minimizes corrosion by removing dissolved gases.
The role of the lexical analyzer
Specification of tokens
Finite state machines
From a regular expressions to an NFA
Convert NFA to DFA
Transforming grammars and regular expressions
Transforming automata to grammars
Language for specifying lexical analyzers
Passenger car unit (PCU) of a vehicle type depends on vehicular characteristics, stream characteristics, roadway characteristics, environmental factors, climate conditions and control conditions. Keeping in view various factors affecting PCU, a model was developed taking a volume to capacity ratio and percentage share of particular vehicle type as independent parameters. A microscopic traffic simulation model VISSIM has been used in present study for generating traffic flow data which some time very difficult to obtain from field survey. A comparison study was carried out with the purpose of verifying when the adaptive neuro-fuzzy inference system (ANFIS), artificial neural network (ANN) and multiple linear regression (MLR) models are appropriate for prediction of PCUs of different vehicle types. From the results observed that ANFIS model estimates were closer to the corresponding simulated PCU values compared to MLR and ANN models. It is concluded that the ANFIS model showed greater potential in predicting PCUs from v/c ratio and proportional share for all type of vehicles whereas MLR and ANN models did not perform well.
π0.5: a Vision-Language-Action Model with Open-World GeneralizationNABLAS株式会社
今回の資料「Transfusion / π0 / π0.5」は、画像・言語・アクションを統合するロボット基盤モデルについて紹介しています。
拡散×自己回帰を融合したTransformerをベースに、π0.5ではオープンワールドでの推論・計画も可能に。
This presentation introduces robot foundation models that integrate vision, language, and action.
Built on a Transformer combining diffusion and autoregression, π0.5 enables reasoning and planning in open-world settings.
Concept of Problem Solving, Introduction to Algorithms, Characteristics of Algorithms, Introduction to Data Structure, Data Structure Classification (Linear and Non-linear, Static and Dynamic, Persistent and Ephemeral data structures), Time complexity and Space complexity, Asymptotic Notation - The Big-O, Omega and Theta notation, Algorithmic upper bounds, lower bounds, Best, Worst and Average case analysis of an Algorithm, Abstract Data Types (ADT)
International Journal of Distributed and Parallel systems (IJDPS)samueljackson3773
The growth of Internet and other web technologies requires the development of new
algorithms and architectures for parallel and distributed computing. International journal of
Distributed and parallel systems is a bimonthly open access peer-reviewed journal aims to
publish high quality scientific papers arising from original research and development from
the international community in the areas of parallel and distributed systems. IJDPS serves
as a platform for engineers and researchers to present new ideas and system technology,
with an interactive and friendly, but strongly professional atmosphere.
2. About Myself
About Myself
I am Network Manager at IIT Kanpur and I manage the
Campus Network and Internet Services of IITK.
IIT Kanpur has one of the largest networks in the
country.
IITK Campus Network now has 6500 nodes providing
connectivity to more than 5000 users in Academic
Departments, Student Hostels and Residences.
IITK has 45 Mbps Internet Connectivity.
All application servers (Mail, DNS, Proxy Caching, Web etc.)
are maintained in-house.
B.Tech (1990) and M.Tech (1996) from IIT Kanpur
Working in IIT Kanpur for more than 14 years
3. Course Content
Course Content
Lecture 1: Overview of the Course and Network
Fundamentals: 2 Hour
Lecture 2: OSI Model& TCP/IP Model : 2 Hour
Lecture 3: Physical Media (Copper, Fiber Optic and
Wireless) : 2 Hour
Lab 1: IIT Kanpur Datacenter Visit: 2 Hour
Lecture 4: UTP & Fiber Cabling: 2 Hour
Lecture 5: LAN Technologies (Ethernet, Fast
Ethernet, Gigabit Ethernet, Wireless LAN) : 2 Hour
Lab 2: Demo and Practice of UTP & Fiber Cabling: 2
Hour
Lecture 6: LAN Technologies (contd.) : 2 Hour
4. Course Content
Course Content
Lecture 7: WAN Technologies (Dialup, Leased Line,
ISDN, ADSL, Cable Modem, VSAT) : 2 Hour
Lab 3: Demo and Practice of Ethernet & Wireless
LAN Setup : 2 Hour
Lecture 8: WAN Technologies (contd.) : 2 Hour
Lecture 9: Internet Protocol (IP) and IP Addressing:
2 Hour
Lab 4: Demo and Practice of Setting up Subnets and
IP Address Assignment : 2 Hour
Lecture 10: Routing, VLAN, TCP and UDP: 2 Hour
Lecture 11: SNMP, Natting, Firewall and VPN: 2 Hour
Lecture 12: Internet and Internet Applications (DNS,
Email, Web..): 2 Hour
5. Course Content
Course Content
Lecture 13: Cisco Basics: 2 Hour
Lecture 14: Cisco Switch and Router Configuration :
2 Hour
Lab 5: Demo and Practice of Cisco Switch
Configuration : 2 Hour
Lab 6: Demo and Practice of Cisco Router
Configuration : 2 Hour
Lecture 15: DNS & Web Server Setup on Linux : 2
Hour
Lab 7: Demo and Practice of DNS and Web Server
Setup : 2 Hour
Lecture 16: Enterprise Network Implementation: 2
Hour
6. Course Content
Course Content
Lecture 17: Mail Server, Proxy Server & Firewall
Setup on Linux : 2 Hour
Lab 8: Demo and Practice of Mail Server , Proxy
Server and Firewall Setup : 2 Hour
7. References
Books
Andrew S. Tanenbaum, Computer Network, Prentice-
Hall
Doughlas E. Comer, Computer Networks and
Internet
http://www.cisco.com/public/support/tac/
documentation.html
http://www.redhat.com/docs
http://home.iitk.ac.in/~navi/sidbinetworkcourse
11. LAN, MAN & WAN
Introduction to Computer Networks
Network in small geographical Area (Room, Building
or a Campus) is called LAN (Local Area Network)
Network in a City is call MAN (Metropolitan Area
Network)
Network spread geographically (Country or across
Globe) is called WAN (Wide Area Network)
12. Applications of Networks
Introduction to Computer Networks
Resource Sharing
Hardware (computing resources, disks, printers)
Software (application software)
Information Sharing
Easy accessibility from anywhere (files, databases)
Search Capability (WWW)
Communication
Email
Message broadcast
Remote computing
Distributed processing (GRID Computing)
13. Network Topology
The network topology
defines the way in
which computers,
printers, and other
devices are connected.
A network topology
describes the layout of
the wire and devices as
well as the paths used
by data transmissions.
Introduction to Computer Networks
14. Bus Topology
Commonly referred to
as a linear bus, all the
devices on a bus
topology are connected
by one single cable.
Introduction to Computer Networks
15. Star & Tree Topology
Introduction to Computer Networks
The star topology is the most
commonly used architecture in
Ethernet LANs.
When installed, the star
topology resembles spokes in
a bicycle wheel.
Larger networks use the
extended star topology also
called tree topology. When
used with network devices that
filter frames or packets, like
bridges, switches, and routers,
this topology significantly
reduces the traffic on the wires
by sending packets only to the
wires of the destination host.
16. Ring Topology
Introduction to Computer Networks
A frame travels around the ring,
stopping at each node. If a node
wants to transmit data, it adds the
data as well as the destination
address to the frame.
The frame then continues around
the ring until it finds the
destination node, which takes the
data out of the frame.
Single ring – All the devices on
the network share a single cable
Dual ring – The dual ring topology
allows data to be sent in both
directions.
17. Mesh Topology
The mesh topology
connects all devices
(nodes) to each other
for redundancy and
fault tolerance.
It is used in WANs to
interconnect LANs and
for mission critical
networks like those
used by banks and
financial institutions.
Implementing the mesh
topology is expensive
and difficult.
Introduction to Computer Networks
19. Networking Media
Networking media can
be defined simply as
the means by which
signals (data) are sent
from one computer to
another (either by cable
or wireless means).
Introduction to Computer Networks
21. Computers: Clients and Servers
In a client/server
network arrangement,
network services are
located in a dedicated
computer whose only
function is to respond
to the requests of
clients.
The server contains the
file, print, application,
security, and other
services in a central
computer that is
continuously available
to respond to client
requests.
Introduction to Computer Networks
23. Applications
E-mail
Searchable Data (Web Sites)
E-Commerce
News Groups
Internet Telephony (VoIP)
Video Conferencing
Chat Groups
Instant Messengers
Internet Radio
Introduction to Computer Networks