0% found this document useful (0 votes)
11 views

Module 1 - Applications

Uploaded by

Ankit Raj
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

Module 1 - Applications

Uploaded by

Ankit Raj
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Module 1 – Applications

Learning Objective:
After studying this module, students will be able to:
1. Know what Client- Server and Peer-to-Peer applications means.
2. Understand the Application requirements and Application Protocol requirements
3. Understand the Uses of a computer network
4. Explain the Case studies of Network Applications / Protocols
5. Understand the Killer apps of the Internet (e.g., email and web)
Structure
1.1 Uses of a computer network
1.2 Killer apps of the Internet (e.g., email and web)
1.3 Application requirements and Application Protocol requirements
1.4 Client- Server and Peer-to-Peer applications
1.5 Case studies of Network Applications / Protocols
1.6 Requirements for the transport layer
1.7 Summary
1.8 References

1.1 Uses of a computer network

The use of computer networks is both for organizations and individual users.
Resource Sharing
Defines that all programs, peripherals, and data that can be run on any computer on a network
are made on any other computer, regardless of physical space. Thus, a user located far away
can share resources and view data on her computer in a manner similar to that used by local
customers.
Resource sharing is another method of load sharing. It can be implemented by using different
computers in the network and partitioning it to reduce time consumption and loading both on
a particular computer.
Simultaneous Access
Computer networks allow users to create programs and data simultaneously. An example is a
company's quarterly sales document, which multiple managers need to view and update.
Information can be stored on network servers, central computers with huge storage devices,
and other resources that can be shared by all users.
When you store files that users access on a server, they are commonly referred to as servers.
As shown in the diagram, a separate copy of the data file is stored on the server and can be
accessed by each employee within the organization. Furthermore, if one user modifies a file,
other users will see the difference when using it.
Higher Reliability with Alternate Sources of Records
Reliability is the main advantage due to which networks are very popular among
organizations. The system allows you to store important data in multiple locations. If your
computer fails or crashes, you can recover your data from other computers in your network.
This way your data is protected within the network.
Cost reduction
The next step for computer networks is reducing costs. Resource sharing automatically
reduces costs, saving you money. One other aspect is that small computers are much cheaper
than mainframes. Mainframes are about ten times faster than microcomputers, but the
price/performance ratio is much better for small/microcomputers than for large/mainframe
computers.
Provision of communication media
Computer networks provide a dynamic communication medium between widely disparate
people. Dividing a project using a network makes it easier for multiple people living in
different locations to work on the same project.

Use of computer networks for people

Computer networks provide the following services to humans −


1. Accessing remote information
2. Access to remote information takes several forms.
3. For example,
a. Home shopping, phone bill payment, e-banking, online stock market, and
more.
b. You can access information systems like the world wide web that contain data
on crafts, business, cuisine, government, health, history, recreation, science,
sports, and more.
c. Newspapers are now available online. Access news that interests you.
Person to Person Communication
Person-to-person communication includes −
a. E-mail (mail)
b. Sending and receiving emails over a typical network is
shown in the diagram −
Teleconferencing and video conferencing
A conference call is a virtual conference where different people from multiple regions type
and discuss messages. Everyone else can see each message on the conference call.
If your clients have the necessary hardware and software, they can talk to each other face-to-
face online rather than just typing messages. This process is called video conferencing.
world newsgroups
In global newsgroups, one individual posts information with few other subscribers who can
interpret it or provide feedback.
⮚ Interactive Entertainment
1.2 Killer apps of the Internet (e.g., email and web)
Killer App is short for Killer Application - both deserve a refactorization.
Killer apps are those applications that suddenly change the paradigm of computing as we
know it.
Kligrapps in temporal order (Fastest Fingers may rearrange)
an application, the use of which is so compelling that it is in itself a sufficient reason to use a
particular computing platform.
It is "accepted wisdom" that no platform will achieve widespread success without such an
application. A platform cannot be a Killer App, it first needs something to run on it that
makes people want to change the habits of a lifetime. For all its good points, BeOS never had
a killer app, and Dave Winer suggested in a recent Dave Net article that Jean Louis Gassee
may even have tried to avoid finding one because he was afraid of becoming subject to it, as
Apple was beholden to Adobe in the early days of the Mac.
The term is most commonly used in the sphere of personal computing. Here are the most
famously recognized killer apps in personal computing by platform:
● Apple II: VisiCalc
● IBM Compatible PC: Lotus 1-2-3
● Apple Macintosh: Adobe PostScript & PageMaker
There is some controversy over what the killer app of the Internet is. If we had to point at a
single program, then it would be Netscape Navigator, but I think that's more a case of good
timing. The net was already growing exponentially before Navigator was released; it just hit
the right spot on the curve.
Email is, and always has been, a far more compelling reason for the adoption of the Internet
than the web. An email has never been dominated by a single application - even in the height
of Netscape's browser market share; they had to share the Windows email client space with
applications such as Eudora. were two very different things.

1.3 Application requirements and Application Protocol requirements

Application Layer Protocol: -


1.TELNET:
Telnet stands for TELetype Network. Useful for terminal emulation. This allows Telnet
clients to access resources on the Telnet server. Used to manage files on the Internet. Used
for initial settings such as switches. A protocol for communicating with remote devices or
systems.
instructions
telnet [\\remote server]
\\RemoteServer: specifies the name of the server to connect to
2. FTP:
FTP stands for File Transfer Protocol. A protocol that allows you to transfer files. It can
facilitate this between any two machines he uses. But FTP is more than just a protocol, it's
also a program. FTP facilitates file sharing through remote computers with reliable and
efficient data transfer. FTP port numbers are 20 for data and 21 for control.
instructions
ftp machine name
3. TFTP:
Trivial File Transfer Protocol (TFTP) is a simplified version of FTP, but it's the protocol of
choice when you know exactly what you need and where. A simplified version of FTP, a
technology for transferring files between network devices. The TFTP port number is 69.
instructions
tftp [options...] [host [port]] [-c command]
4.NFS:
It stands for Network File System. This allows remote hosts to mount file systems over the
network and interact with those file systems as if they were mounted locally. This allows
system administrators to consolidate resources onto a central server on the network. The NFS
port number is 2049.
instructions
service nfs start
5.SMTP:
Abbreviation for Simple Mail Transfer Protocol. It is part of the TCP/IP protocol. Using a
process called "store and forward," SMTP moves email on and between networks. It works
closely with what's called a mail transfer agent (MTA) to direct correspondence to the
appropriate computer and email inbox. The port number for SMTP is 25.
instructions
Email from: <[email protected]?
6.LPD:
It stands for Line Printer Daemon. Designed for printer sharing. The part that receives and
processes requests. A "daemon" is a server or agent. The LPD port number is 515.
instructions
lpd [ -d ] [ -l ] [ -D DebugOutputFile]
7. X Windows:
Defines a protocol for creating graphical user interface-based client/server applications. The
idea is to allow programs called clients to run on a single computer. It is basically used in
networks of interconnected mainframes. X Windows port numbers start at 6000 and
increment by 1 for each server.
instructions
Run xdm in runlevel 5.
8. SNMP:
It stands for Simple Network Management Protocol. A management station polls devices on
the network at regular or random intervals to collect data and ask them to reveal specific
information. This allows servers to share information about their current status and also
provides a channel through which administrators can change predefined values. The SNMP
port numbers are 161 (TCP) and 162 (UDP).
instructions
snmpget -mALL -v1 -cpublic snmp_agent_Ip_address sysName.0
9. DNS:
Abbreviation for Domain Name System. Therefore, every time you use a domain name, your
DNS service must translate that name into its corresponding IP address. For example, the
domain name www.abc.com may be translated to 198.105.232.4.
The DNS port number is 53.
instructions
ipconfig /flushdns
10. DHCP:
It stands for Dynamic Host Configuration Protocol . Give the host an IP address. When a host
registers an IP address with her DHCP server, there are many pieces of information that the
DHCP server can provide to the host. The DHCP port numbers are 67, 68.
instructions
clear ip dhcp binding {address | *}

1.4 Client-Server and Peer-To-Peer Applications

Client-Server Network: This model is a widely used network model. Client-server networks
distinguish between clients and servers, and there are specific servers and clients. In a Client-
Server Network, centralized servers are used to store data because administration is
centralized. In a Client-Server Network, Servers respond to services requested by Clients.

Client-Server

Peer-To-Peer Network: It does not distinguish between clients and servers. Individual nodes
are themselves clients and servers. A peer-to-peer network allows individual nodes to both
request and respond to services.
a. Peer-to-peer networks are often created by clusters of 12 or fewer computers.
These computers all use their own security to store data, but they also share
data with all other nodes.
b. In peer-to-peer networks, nodes consume and produce resources. Therefore, as
the number of nodes increases, so does the ability to share resources in a peer-
to-peer network. This is different from a client/server network, where an
increase in nodes overloads the server.
c. Nodes in peer-to-peer networks act as both clients and servers, making it
difficult to provide adequate security. This can lead to denial-of-service
attacks.
d. Most modern operating systems, including Windows and Mac OS, come with
software to implement Peers.

Peer-to-Peer Network
Comparison
Basis of Client-Server Network Peer-to-Peer Network
Comparison

Basic In a client-server network, we have a In a peer-to-peer network, clients


specific server and specific clients are not distinguished; every node
connected to the server. acts as a client and server.

Expense A Client-Server network is more A Peer-to-Peer is less expensive to


expensive to implement. implement.

Stability It is more stable and scalable than a peer- It is less stable and scalable, if the
to-peer network. number of peers increases in the
system.

Data In a client-server network, the data is In a peer-to-peer network, each


stored in a centralized server. peer has its own data.

Server A server may get overloaded when many A server is not bottlenecked since
customers make simultaneous service the services are dispersed among
requests. numerous servers using a peer-to-
peer network.
Focus Sharing the information. Connectivity.

Service The server provides the requested service Each node has the ability to both
in response to the client's request. request and deliver services.

Performance Because the server does the bulk of the Because resources are shared in a
work, performance is unaffected by the big peer-to-peer network,
growth of clients. performance will likely suffer.

Security A Client-Server network is a secured The network's security


network because the server can verify a deteriorates, and its susceptibility
client's access to any area of the network, grows as the number of peers
making it secure. rises.

Difference between Client-Server and Peer-to-Peer Network:


1. The main difference between client/server and peer-to-peer networks is that in
client/server networks, there are dedicated servers and specialized clients, whereas, in
peer-to-peer networks, any node can act as both client and server.
2. The importance of connectivity between peers is more important in a peer-to-peer
architecture than in a client-server approach.
3. Each peer has its data in a client/server network, unlike a client/server network where
data is stored on a single server.
4. In a client-server network, servers provide services to clients. On the other hand, peer-
to-peer allows each peer to both request and deliver services.
5. Client-server networks are more stable and scalable than peer-to-peer.
6. Client-server networks are more expensive than peer-to-peer networks.
7. Peer-to-peer systems have distributed servers, making them less likely to be
bottlenecks. Client/server systems, on the other hand, have a single server that serves
all clients, so the server is more likely to be the bottleneck.
Difference between Client-Server and Peer-to-Peer Network:

S. No Client-Server Network Peer-to-Peer Network

1. In Client-Server Network, Clients In Peer-to-Peer Network, Clients and


and servers are differentiated, servers are not differentiated.
Specific server and clients are
present.

2. Client-Server Network focuses on While Peer-to-Peer Network focuses


information sharing. on connectivity.

3. In the Client-Server Network, While in Peer-to-Peer Network, Each


Centralized server is used to store peer has its own data.
the data.

4. In the Client-Server Network, Server While in Peer-to-Peer Network, Each


responds to the services which are and every node can do both request
requested by Client. and respond for the services.

5. Client-Server Network is costlier Peer-to-Peer networks are less costly


than Peer-to-Peer Network. than Client-Server networks.

6. Client-Server Networks are more Peer-to-Peer networks are less stable


stable than Peer-to-Peer Network. if the number of peers increases.

7. Client-Server Network is used for Peer-to-Peer Network is generally


both small and large networks. suited for small networks with fewer
than 10 computers.

1.5 Network Application/Protocol Case Studies


A web server is a special computer system that runs over HTTP through web pages. A web
page is a medium for carrying data from one computer system to another. A web server's
work begins with the client or user. A client sends a request to her web server via a web
browser. The web server receives this request, processes it, and sends the processed data back
to the client. The server collects all web page information and sends it to the user. This will
be displayed in the form of her web page on your computer system. Domain names and IP
addresses are important to web servers when clients send requests to them for processing.
Domain names and IP addresses are used to identify users in large networks.

1.6 Requirement for the Transport layer

The transport layer delivery of messages is either connection-oriented or connectionless. A


connection-oriented transport layer delivers error-free messages in the correct order. Such a
transport layer provides the following services: CONNECT, DATA, EXP_DATA, and
DISCONNECT.

1.7 Summary

⮚ Computer networks can be used for a variety of services by both businesses and
individuals. For businesses, networks of personal computers using shared servers
often provide access to corporate information.
⮚ Typically, the client/server model is followed, with client workstations on employee
desktops accessing powerful servers in the engine room.
⮚ For individuals, networks provide access to a wide variety of information and
entertainment resources.
⮚ An individual often accesses the Internet by calling his ISP through a modem, but
more and more people have a landline phone at home.
⮚ One emerging area is wireless connectivity with new applications such as mobile
email access and m-commerce.
⮚ Broadly speaking, networks can be divided into LANs, MANs, WANs, and
internetworks according to their unique characteristics and technologies. speed and
niche. The LAN covers the entire building and works at high speeds.
⮚ For example, MAN covers the city's cable television system, which many people now
use to access the Internet. A WAN covers a country or continent. LAN and MAN are
not interchanged (i.e. no routers).
⮚ WAN switching, Wireless networks, especially wireless LANs, are becoming more
and more popular. Networks can be connected to form an internetwork.

1.8 References
1. Tannenbaum, “Computer Network”, Pearson Education
2. Godbole, “Data Communications and Networking”, Tata Mc Graw-Hill
3. Forouzan,” Communications and Networking”, Tata Mc Graw-Hill

You might also like