Lecture 7 (ACN)

Download as pdf or txt
Download as pdf or txt
You are on page 1of 27

In the name of Almighty Allah…

Advanced Computer
Networks

Dr. Muhammad Bilal, Ph.D.


PhD Computer Science, Zhejiang University China
MS Computer Science, NTU Faisalabad Pakistan
B.Sc (Hons) Computer Science, UET Lahore Pakistan
Email:- [email protected]
Superior University Faisalabad, Campus
Motivation
Uses of Computer Networks

Computer Networks - A Tanenbaum - 5th edition


Computer Network By James Rose
Book Used
• Computer Networks - A Tanenbaum - 5th
edition
• Computer Network By James Rose
Grading
Remember:-
➢ In your Wording
• Assignments
• Projects /Term Papers

➢ No credit for work that is not your own.


Email checker (Online tool)
➢ Free email Verification tool
https://email-checker.net/

➢ SMTP First it checks for email address format.


➢ Then make sure that domain name is valid. We also check
whether it’s a disposable email address or not.
➢ In the final step, It extracts the MX records from the
domain records and connects to the email server (over
SMTP and also simulates sending a message) to make sure
the mailbox really exists for that user/address. Some mail
servers do not cooperate in the process, in such cases, the
result of this email verification tool may not be as accurate
as expected.
Uses of Computer Networks
Business Applications
– Traditional uses at companies
Home Applications
– Home networking and recent developments
regarding it.
Mobile users
Social Issues
Business Applications
Goals of setting up a computer network and doing
business electrically Security Goals→ CIA

Resource sharing
– The goal is to make all programs, equipment, and
especially data available to anyone on the network without
regard to the physical location of the resource or the user.
– An obvious and widespread example is having a group of
office workers share a common printer.
Information sharing
• Companies small and large are vitally dependent on computerized
information.
Business Applications - Continue
Communication medium
– Email (electronic mail)
– IP telephony or Voice over IP (VoIP)
• Video can be added to audio so that employees at distant locations can see
and hear each other as they hold a meeting.
• For example skype, WhatsApp, Viber, Facebook Messenger
Desktop sharing
• This makes it easy for two or more people who work far apart to read and write
a shared blackboard or write a report together.
• Example Anydesk, TeamViewer software
E-commerce (electronic commerce)
– Companies are doing business electronically, especially with
customers and suppliers.
– Airlines, bookstores, and other retailers have discovered that many
customers like the convenience of shopping from home.
– Example Daraz, Alibaba, Amazon,OLX online business
Business Applications - Continue
• Client-server model (Example – Web Applications)
• RVPN– Remote Virtual Private Network
Home Applications
• Internet access provides home users with connectivity
to remote computers. As with companies, home users
can access information, communicate with other people,
and buy products and services with e-commerce.
• Access to remote information comes in many forms. It
can be surfing the World Wide Web for information or
just for fun.
• 666= www (Read)
• Information available includes the arts, business,
cooking, government, health, history, hobbies,
recreation, science, sports, travel, and many others.
Fun comes in too many ways to mention, plus some ways
that are better left unmentioned.
Home Applications - Continue
• Many newspapers have gone online and can be
personalized.
– For example, it is sometimes possible to tell a
newspaper that you want everything about corrupt
politicians, big fires, scandals involving celebrities,
and epidemics, but no football, thank you.
COVID-19
– ACM (www.acm.org) and the IEEE Computer
Society (www.computer.org)
Home Applications - Continue
• Categories of network use in home
applications

1. Peer-to-peer communication
2. Person-to-person communication
3. Electronic commerce in the broadcast sense
4. Entertainment
5. Ubiquitous computing
Home Applications - Continue
• In Client-Server Network,
Centralized server is used to store the
data. While in Peer-to-Peer Network,
Each peer has its own data.
• In Client-Server Network, Server respond
the services which is request by Client.
While in Peer-to-Peer Network, Each and
every node can do both request and
respond for the services
Home Applications - Continue
• Peer-to-peer communication (Example - BitTorrent )
Home Applications - Continue
• Person-to-person communication
– Email
– Instant messaging
• Twitter
– Multi-person messaging
• Example- Online lectures on youtube, youku
– Social Network Applications
• Facebook
– Groups of people can work together to create content.
• Wikipedia
Home Applications - Continue
• Electronic commerce in the broadest sense
– Home shopping is already popular and enables users to
inspect the online catalogs of thousands of companies.
Some of these catalogs are interactive, showing products
from different viewpoints and in configurations that can
be personalized.
– Another area in which e-commerce is widely used is access
to financial institutions. For example pay online bills.
– Online auctions of second-hand goods have become a
massive industry.
• Unlike traditional e-commerce, which follows the client-server
model, online auctions are peer-to-peer in the sense that consumers
can act as both buyers and sellers.
Home Applications - Continue
• Some forms of e-commerce
Home Applications - Continue
➢ Ubiquitous computing (or "ubicomp") is a
concept in software engineering
and computer science where computing is
made to appear anytime and everywhere.
➢ In contrast to
desktop computing, ubiquitous
computing can occur using any device, in
any location, and in any format.
➢ Also know as Pervasive computing
Home Applications - Continue
Home Applications - Continue
Entertainment
• music, radio and television programs, movies and games.
Ubiquitous computing (Anytime, anywhere, anylocation)
– Our last category is ubiquitous computing, in which
computing is embedded into everyday life. IoT
– Many homes are already wired with security systems that
include door and window sensors, and there are many
more sensors that can be folded in to a smart home monitor,
such as energy consumption. Your electricity, gas and
water meters could also report usage over the network.
– This would save money as there would be no need to send
out meter readers.
– Self Driving Cars, Smart Bulbs, Smart Locks.
Mobile users
• Why would anyone want one? People on the go often
want to use their mobile devices to read and send
email, tweet, watch movies, download music, play
games, or simply to surf the Web for information.

• They want to do all of the things they do at home


and in the office. Naturally, they want to do them
from anywhere on land, sea or in the air.
Mobile users - Continue
• Cellular networks
• texting
• Fixed wireless and mobile wireless
• Smart phones
• GPS (Global Positioning System)
• m-commerce (mobile-commerce)
• Sensor networks
• Wearable computers
Mobile users - Continue
• Combinations of wireless networks and mobile
computing
Social Issues
• Network neutrality
Network neutrality is a principle that all
web traffic should be treated equally.
• Viruses
– Phishing

You might also like