![Page 1: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/1.jpg)
Dr. John P. Abraham
Introduction to Computer Networks
INTRODUCTION TO COMPUTER NETWORKS
![Page 2: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/2.jpg)
What is covered in the course Network Applications & Network
programming Data communications (low level details) Packet switching and network technologies Internetworking with TCP/IP Other concepts such as interoperability
standards, protocol suites and layering models
![Page 3: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/3.jpg)
Lecture material
Your textbook is a very basic book Since network is constantly evolving I will
provide lots of notes from outside the textbook. You should take good notes. Exam questions will come from both.
![Page 4: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/4.jpg)
Socket programming
All underlying network applications such as email, ftp, web, etc. use underlying technologies and programs
The goal of this course is not to teach you programming. Students should write three socket programs in a language of their choice
![Page 5: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/5.jpg)
Data Communication
Technologies used to send data across communication lines Modulation Digital to analog Light Multiplexing Encryption
![Page 6: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/6.jpg)
Packet Switching and networking technologies Evolved from telegraph and telephone
technologies Mechanical connections are replaced with
electronic switches Packet switching – eliminated the need for a
dedicated circuit Devices through out the network should have
information about how to reach the target destination Takes into account speed, cost, distance and size of
packets
![Page 7: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/7.jpg)
Internetworking with TCP/IP
Tolerance of heterogeneity of underlying technologies.
The internet is formed by interconncecting multiple packet-switching networks, as well as public and private networks.
![Page 8: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/8.jpg)
Computer Networks
Computer network connects two or more autonomous computers.
The computers can be geographically located anywhere.
Introduction to Computer Networks
![Page 9: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/9.jpg)
LAN, MAN & WAN
Introduction to Computer Networks
Network in small geographical Area (Room, Building or a Campus) is called LAN (Local Area Network)
Network in a City is call MAN (Metropolitan Area Network)
Network spread geographically (Country or across Globe) is called WAN (Wide Area Network)
![Page 10: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/10.jpg)
Computer network architectures the client server
all communication happens between the server and the client only. A client does not communicate directly with another client.
If a client wishes to share a file with another client, it must place the file in a commonly shared area at the server.
In case of an application, the client makes the request and the server processes the request and returns the result to the client.
the peer-to-peer any node can act as a server as well as a client. Only very limited security is available on a peer-to-peer network.
![Page 11: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/11.jpg)
Components used in a Computer Network
Computers Communication ports Cables Hubs or switches Routers The network software.
![Page 12: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/12.jpg)
Computers in a Client/Server architecture
Must be be robust must be able to run for months or years without being shut down.
Must be fast enough to handle many requests from all the requests from the clients.
Must have large fast hard drives to store information for all users. Must have enough memory to cache all the directory information as well as
most used pages. The computers must be reliable in case of power failures and hardware
failures: sufficient redundancy must exist.
![Page 13: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/13.jpg)
Example of Types of Servers
Fileserver print server database server domain name server communication server DHCP server Name Server
![Page 14: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/14.jpg)
Communication ports
Network may be done through any communication ports such as serial, parallel, network cards, etc.
Most common Network Cards used today are Ethernet and Token Ring.
![Page 15: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/15.jpg)
Network Interface Card
Plug and play (PNP). Open the computer, install the card, and insert the driver disk.
Legacy cards: the interrupt request line (IRQ), base memory address, and the
base I/O port must be manually set up on the card by setting the jumpers or DIP switches, or through the use of the manufacturer provided setup software.
Speed: 10 Megabits per second (Mbps), 100 Mbps (Fast Ethernet) or 1000 Mbps (Gigabit Ethernet) depending on the card.
![Page 16: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/16.jpg)
Connectors on NIC
The connector on most Ethernet cards today is the RJ-45 having 8 pins.
Older Ethernet cards may have a Bayonet Nut Connector (BNC), an Attachment Unit Interface (AUI), and/or a RJ-45 connector. A jumper or switch will specify the type of connector used.
![Page 17: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/17.jpg)
Network Addresses
Every computer connected to a network should have two unique identifying numbers, a physical address and an Internet Protocol (IP) address. The physical address
a 6 Byte number, is encoded on a ROM chip on the Ethernet card at the time of manufacturing
the IP address A 4 byte address is used to send messages to the outside world. The physical
address. configured on each machine.
![Page 18: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/18.jpg)
Hub/Switch
A Hub or switch connects cables from different nodes together. When purchasing them the number of ports required and the speed of transmission must be specified.
An active hub amplifies all signals received and sends the amplified signals on all its ports.
Passive hubs are signal splitters and are used only in wiring panels. Even though a little more expensive, a switch will provide faster
communication and great deal of diagnostic features. Switches provide link management through physical address identification.
![Page 19: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/19.jpg)
Hubs/Switches
As the network grows, multiple switches or hubs can be connected with each other using an uplink port or a direct connect cable.
Most modern switches have the auto-sensing feature, which will allow any port to work as an uplink.
The best location for a switch or hub is a centrally located closet to which cables from all computers are brought.
![Page 20: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/20.jpg)
Network Cabling
Cabling is the most time consuming part of networking, particularly when cables need to be hidden inside the walls.
For that reason it is advisable to have the cables installed or conduits placed at the time of the building construction.
To hide wires inside existing buildings, a tape fish will be needed. It may be well worth the time to investigate the wireless technology,
particularly when a small area is being networked.
![Page 21: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/21.jpg)
Network cabling 2
Three types of cables are used today: coaxial, twisted pair, and fiber-optic. Twisted pair cables either can be unshielded or shielded with a foil. Unshielded twisted pair (UTP) cable can transmit 10 Megabits per second and
the shielded can transmit more than 100 Mbps, perhaps all the way up to 1000 Mbps.
Wires in each pair are twisted to reduce cross-talk and minimize the effect of external electromagnetic interference.
Twisted pair cables are categorized into five categories, from Cat 1 to Cat 5, based on the bandwidth capabilities.
The maximum length of a segment is 100 meters.
![Page 22: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/22.jpg)
Network Cabling 3
The UTP cable has 4 pairs of color-coded (orange, green, blue and brown) wires.
The color of one of the wires in a pair will be solid and the other will be striped with white.
Pins in the RJ-45 jack are numbered from 1 to 8. When two computers are connected directly without the use of a hub or
a switch some wires need to be crossed (Transmit to Receive). Such a cable is called a crossover cable. Crossover cables need to be used when two hubs or switches that lack uplink ports are connected together.
![Page 23: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/23.jpg)
T-568A Straight-Through Ethernet Cable
![Page 24: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/24.jpg)
T-568B Straight-Through Ethernet Cable
![Page 25: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/25.jpg)
RJ-45 Crossover Ethernet Cable
![Page 26: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/26.jpg)
Crossover cable
![Page 27: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/27.jpg)
Network Protocols
7 layer OSI model 5 layer TCP/IP suite There exists three TCP/IP network environment today, Novell Networking,
Microsoft Windows Networking, and the UNIX/LINUX networking.
![Page 28: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/28.jpg)
Network Operating Systems
The Novell Networking incorporates its original IPX/SPX protocol suite as well as the TCP/IP protocol suite.
Windows and Unix operating systems include TCP/IP networking as part of their operating system.
All versions of Windows provide the peer-to-peer networking capabilities, while the NT, 2000 professional, and the XP professional provide for Client/Server architecture.
The UNIX/LINUX has consistently adhered to the Client/Server architecture.
![Page 29: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/29.jpg)
Windows peer-to-peer networking
may use the TCP/IP protocol suite or some other simpler protocols such as the NetBIOS and the NetBEUI.
The NetBIOS, an application program interface (API) extends the BIOS to include the support for I/O calls over a network.
The NetBIOS Extnded User Interface (NetBEUI), developed by IBM and Microsoft, is the protocol used by Windows Workgroup networking.
![Page 30: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/30.jpg)
Windows peer-to-peer networking
NetBios is non-routable, therefore could not reach beyond the local physical network.
It does not require an IP address, rather works with the name registration within a workgroup.
In the newer Windows operating systems, the NetBEUI is encapsulated inside the TCP/IP, referred to as NetBIOS over TCP/IP (NBT), and uses the IP address.
![Page 31: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/31.jpg)
Configuring the windows network
From the control panel’s, local area network, add a NIC if it does not show up already. Insert the appropriate driver software.
Next Choose the protocols to be bound to the network card, NetBios, TCP/IP, IPX/SPX, Appletalk, etc.
Set up the properties for the protocol you chose. For example, for the TCP/IP, you will asked to either obtain the addresses automatically or type in the IP Address, mask, default gateway, and DNS. The default gateway is the address of the host through which internetworks can be reached (a router or a computer that shares Internet). DNS is the server that provides the IP address given a domain name.
Install the client services and give your computer a name and a group. Finally, you may want to share your resources.
![Page 32: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/32.jpg)
Applications of Networks
Introduction to Computer Networks
Resource Sharing
Hardware (computing resources, disks, printers)
Software (application software)
Information Sharing
Easy accessibility from anywhere (files, databases)
Search Capability (WWW)
Communication
Message broadcast
See next slide
![Page 33: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/33.jpg)
Application of network 2
Remote computing
Virtualization (see future slides)
Supercomputing - used for highly calculation-intensive tasks in quantum physics, genetics, weather modeling, etc.
Distributed processing – A program running on top of a network that distributes the job.
GRID Computing – very similar to distributed. A middleware is used to manage all the computers in the system (see next slide).
Cloud computing (see future slide)
![Page 34: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/34.jpg)
Grid computing
Multiple independent computing clusters which act like a “grid” because they are composed of resource nodes not located within a single administrative domain.
Offering online computation or storage (like electricity sale).
The creation of a “virtual supercomputer” by using spare computing resources within an organization
![Page 35: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/35.jpg)
Virtualizationthe act of decoupling one computing resource from others without impacting the usability across these resources.
User state virtualization
Application virtualization.
Client-Hosted Desktop virtualization
Server-based Desktop virtualization
Application Virtualization
![Page 36: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/36.jpg)
User state virtualization.
separates the user data and settings from any PC and enables IT to store them centrally (i.e., in the datacenter) while also making them accessible on any PC. It also simplifies the central backup of user data since data is already stored centrally on servers.
http://technet.microsoft.com/en-us/windows/ff629664
![Page 37: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/37.jpg)
Application virtualization
Only need to install once. Can run it from any machine. Isolates applications from each other and solves application to application compatibility issues by allowing applications to run together even though they may require the same resources from the OS
Application virtualization allows IT to store the application centrally and stream the application to a desktop based on user access.
http://www.youtube.com/watch?v=kSa9VBYyyk4 http://www.installfree.com/beta-signup
![Page 38: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/38.jpg)
Client-Hosted Desktop Virtualization. technology (such as Microsoft® Virtual PC or
Sun xVM Virtual Box ) that separatesthe operating system from the physical hardware and allows a single PC to run virtual machines side by side with the host OS.
http://www.microsoft.com/virtualization/assets/media/chv/local/index.htm
http://www.youtube.com/watch?v=0Y2eClEy7jU
![Page 39: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/39.jpg)
Server-Based Desktop Virtualization: Allows the execution of an environment at one place and
presentation of that environment or user interface at a different location. These technologies usually use remote desktop protocols, such as RDP, to decouple the user interface location from the execution environment location. Remote execution enables organizations to use older PCs as “thin clients,” giving users the benefit of newer applications and versions of Windows while helping save the environment by avoiding the dumping of electronics into landfills.
http://www.cio.com/article/504348/Desktop_Virtualization_5_Most_Popular_Flavors_Explained
![Page 40: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/40.jpg)
Cloud Computing
is location independent computing shared servers provide resources, software, and data to
computers. computing is moved away from personal computers or an
individual application server to a “cloud” of computers. Users of the cloud only need to be concerned with the computing
service being asked for, as the underlying details of how it is achieved are hidden. This method of distributed computing is done through pooling all computer resources together and being managed by software rather than a human.
http://www.microsoft.com/en-us/server-cloud/new.aspx
![Page 41: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/41.jpg)
Network Topology
The network topology defines the way in which computers, printers, and other devices are connected. A network topology describes the layout of the wire and devices as well as the paths used by data transmissions.
Introduction to Computer Networks
![Page 42: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/42.jpg)
Bus Topology
Commonly referred to as a linear bus, all the devices on a bus topology are connected by one single cable.
Introduction to Computer Networks
![Page 43: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/43.jpg)
Star & Tree Topology
Introduction to Computer Networks
The star topology is the most commonly used architecture in Ethernet LANs.
When installed, the star topology resembles spokes in a bicycle wheel.
Larger networks use the extended star topology also called tree topology. When used with network devices that filter frames or packets, like bridges, switches, and routers, this topology significantly reduces the traffic on the wires by sending packets only to the wires of the destination host.
![Page 44: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/44.jpg)
Ring Topology
Introduction to Computer Networks
A frame travels around the ring, stopping at each node. If a node wants to transmit data, it adds the data as well as the destination address to the frame.
The frame then continues around the ring until it finds the destination node, which takes the data out of the frame.
Single ring – All the devices on the network share a single cable
Dual ring – The dual ring topology allows data to be sent in both directions.
![Page 45: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/45.jpg)
Mesh Topology
The mesh topology connects all devices (nodes) to each other for redundancy and fault tolerance.
It is used in WANs to interconnect LANs and for mission critical networks like those used by banks and financial institutions.
Implementing the mesh topology is expensive and difficult.
Introduction to Computer Networks
![Page 46: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/46.jpg)
Network Components
Introduction to Computer Networks
Physical Media
Interconnecting Devices
Computers
Networking Software
Applications
![Page 47: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/47.jpg)
Networking Media
Networking media can be defined simply as the means by which signals (data) are sent from one computer to another (either by cable or wireless means).
Introduction to Computer Networks
![Page 48: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/48.jpg)
Networking Devices
Introduction to Computer Networks
HUB, Switches, Routers, Wireless Access Points, Modems etc.
![Page 49: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/49.jpg)
Computers: Clients and Servers
In a client/server network arrangement, network services are located in a dedicated computer whose only function is to respond to the requests of clients.
The server contains the file, print, application, security, and other services in a central computer that is continuously available to respond to client requests.
Introduction to Computer Networks
![Page 50: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/50.jpg)
Networking Protocol: TCP/IP
Introduction to Computer Networks
![Page 51: Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS](https://reader035.vdocuments.us/reader035/viewer/2022062308/56649e4b5503460f94b40828/html5/thumbnails/51.jpg)
Applications
E-mailSearchable Data (Web Sites)E-CommerceNews GroupsInternet Telephony (VoIP)Video ConferencingChat GroupsInstant Messengers Internet Radio
Introduction to Computer Networks