0% found this document useful (0 votes)
59 views11 pages

Class 1: Introduction: Ice 4017: Computer Networks and Protocol

This document provides an introduction to the course "Computer Networks and Protocol" taught by Dr. S. Meenatchisundaram. It discusses how computer networks allow computers to exchange information and come in many sizes. The key advantages of computer networks are resource sharing, high reliability through backups, cost savings, communication medium, flexible work environments, and scalability. Some disadvantages are social, ethical, and political problems from misuse of networks. Examples of network applications include client-server models for businesses and peer-to-peer systems for homes. Electronic commerce is also discussed.

Uploaded by

meenasundar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views11 pages

Class 1: Introduction: Ice 4017: Computer Networks and Protocol

This document provides an introduction to the course "Computer Networks and Protocol" taught by Dr. S. Meenatchisundaram. It discusses how computer networks allow computers to exchange information and come in many sizes. The key advantages of computer networks are resource sharing, high reliability through backups, cost savings, communication medium, flexible work environments, and scalability. Some disadvantages are social, ethical, and political problems from misuse of networks. Examples of network applications include client-server models for businesses and peer-to-peer systems for homes. Electronic commerce is also discussed.

Uploaded by

meenasundar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

ICE 4017: COMPUTER NETWORKS AND

PROTOCOL

Class 1: Introduction

Dr. S. Meenatchisundaram
Email: meenasundar@gmail.com
References:
• Tanenbaum A. S., “Computer Networks”, 3rd Edition, Prentice
Hall of India Pvt Ltd.(EEE), New Delhi 1996.
• Forouzan Behrouz A., TCP/IP Protocol suite, Tata Mcgraw Hill
Publishing Co. Ltd., New Delhi 2000.
• Todd Lammle, CCNA Cisco Certified Network Associate Study
Guide (7th Edition)
• Danielle Ruest, Nelson Ruest , Virtualization, A Beginner's Guide
• Robert C ElsenPeter et.al, McGrawHill, Cloud Computing , A
Practical Approach Cloud Application Architecture
• Mauricio Arregoces and Maurizio Portolani, Cisco Press,
Datacenter Fundamentals.

Computer Networks and Protocol (ICE 4017)


Dr. S. Meenatchi Sundaram, MIT, Manipal
Contents
• Introduction
• Advantages & Disadvantages of Computer Networks
• Network Hardware
• Network Structures (Components)
• Network Topology
• Network Software
• Network Architecture
• Services
• Reference Models (ISO – OSI & TCP / IP)
• Examples

Computer Networks and Protocol (ICE 4017)


Dr. S. Meenatchi Sundaram, MIT, Manipal
Computer Networks
• A collection of autonomous computers interconnected by
a single technology.
• Two computers are said to be interconnected if they are
able to exchange information.
• The connection need not be via a copper wire; fiber
optics, microwaves, infrared, and communication
satellites can also be used.
• Networks come in many sizes, shapes and forms.
• Is internet and world wide web a computer network????
• the Internet is not a single network but a network of networks and the
Web is a distributed system that runs on top of the Internet

Computer Networks and Protocol (ICE 4017)


Dr. S. Meenatchi Sundaram, MIT, Manipal
Uses of computer networks
• Best utilization of available data, programs and computing
systems.
1. Resource or load sharing:
• Operational advantage – sharing a unique technology,
software and large-scale computers.
• Managerial advantage: Managing the resource in efficient way.
2. High Reliability:
• Provides back up facilities
• Alternative sources in case of hardware failure – useful for
critical application like air traffic control, Military, Banking, etc.

Computer Networks and Protocol (ICE 4017)


Dr. S. Meenatchi Sundaram, MIT, Manipal
Uses of computer networks
3. Saving of Money:
• Replacement of mainframe computers by small powerful
pc’s:
• Better performance ratio
4. Communication medium:
• A powerful media for widely separated users ex: email.
5. Flexible working environment:
• Access to information systems, for problem solving
6. Scalability:
• Ability to increase system performance by adding more
processors with workload increasing

Computer Networks and Protocol (ICE 4017)


Dr. S. Meenatchi Sundaram, MIT, Manipal
Disadvantages of computer
networks
Network – global level leads to social, ethical and
political problems like
i. Misuse of network for politics, religion, etc.,
ii. Moral issues
iii. Anonymous accusations
iv. Users rights to free speech
v. Employee rights v/s employer rights.

Computer Networks and Protocol (ICE 4017)


Dr. S. Meenatchi Sundaram, MIT, Manipal
Business Applications

Computer Networks and Protocol (ICE 4017)


Dr. S. Meenatchi Sundaram, MIT, Manipal
Business Applications

The client-server model involves requests and replies

Computer Networks and Protocol (ICE 4017)


Dr. S. Meenatchi Sundaram, MIT, Manipal
Home Applications
• Access to remote information
• Person-to-person communication
• Interactive entertainment
• Electronic commerce

In a peer-to-peer
system there are
no fixed clients
and servers

Computer Networks and Protocol (ICE 4017)


Dr. S. Meenatchi Sundaram, MIT, Manipal
E Commerce

Computer Networks and Protocol (ICE 4017)


Dr. S. Meenatchi Sundaram, MIT, Manipal

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy