SlideShare a Scribd company logo
Networking
Dr. Kamal Gulati
What is Networking?
 Definition: A network connects two or
more computers so that they can
share information, applications or
resources.
Networking
 Networks are simply a collection of
resources connected by cable or other
media so they can share information
 Networks made sharing data much easier
and more efficient for users.
Network: To connect two or more
computers together with the ability
to communicate with each other
Examples of Shared Resources
 Printers
 Fax devices
 Files and Folders (Data)
 Modems
Example of Services
 Email
 Database
 Internet Access
Hardware tools / Network Components
used in connecting system’s for a
Network
 NIC (Network Interface Card) or Ethernet
 HUB (Repeater)
 SWITCH
 Transmission Medium – Cables / Wires,
Connectors.
 ROUTER
 BRIDGE
 MODEM
 GATEWAY
 WIRELESS CARD
Network Components
 Server : Powerful machine with a robust
performance and power (e.g. Windows NT, 2000
Server, 2003 Server, Longhorn, Enterprise Linux)
 Client: Uses the server’s services – any machine
running a client software (e.g. Windows 3.11, 95,
98, ME, 2000, XP, Vista, 7, 8 etc ……)
 Peer: Acts as both Client and Server
Network Components
 Media: Bounded (UTP, STP or Coax.) or
unbounded( Satellite, Microwave or wireless)
 Resources: anything that client uses
 User: any person using the resources
 Protocols: the rules of communication (TCP/IP,
IPX/SPX,…..)
Network Components
Server Client Client Client
Client
Resources
Networking
 All systems on the link must follow a set of
common communication rules called
protocols.
Networking Models
 Peer-to-Peer
 Server-Based
It is important to remember that one
type of networking configuration is
not necessarily better than another.
Peer-to-Peer
 There are no dedicated servers
 All the computers are equals and therefore are
known as peer.
 Each computer functions as both client and server,
 No administrator
 Each user determine what data to share
Peer-to-Peer
Features of peer-to-peer network
=<Size
=<Cost
=<Operating Systems
=<Implementation
=<Administration
=<Sharing resources
=<Server requirements
=<Security
Peer-To-Peer
 Size
 Peer-to-peer is called “workgroup”
 Workgroup: small group of computers
 In peer-to-peer there are 10 or less computers.
Peer-To-Peer
 Cost:
 Is simple
 Each computer functions as client and server, so
there is no need to central server
 Less expensive than server-based networks.
Peer-To-Peer
 Operating Systems
 No additional software is required to set up a peer-
to-peer network.
Peer-to-Peer
 Implementation
 Peer-to-Peer implementation offers the following
advantages:
 Computers are located at users’ desks.
 Users act as their own administrators and plan their
own security.
 Computers in the network are connected by a
simple, easily visible cabling system.
Peer-to-Peer
 Where a Peer-to-Peer is appropriate
 There are 10 users or fewer.
 Users share resources, such as files and printers,
but no specialized servers exist.
 Security is not an issue
 The organization and the network will experience
only limited growth within the foreseeable future.
Peer-to-Peer
 Administration
 Network administration tasks include:
 Managing users and security
 Making resources available
 Maintaining applications and data
 Installing and upgrading application & operating
system software.
Peer-to-Peer
 Sharing resources
 All users can share any of their resources in any manner
they choose.
 Resources include: data, printers, fax cards, and so on.
 Server requirements
 In a peer-to-peer, each computer must:
 Use a large percentage of its resources to support the
users (local user).
 Use additional resources such as hard-disk space and
memory to support user’s accessing resource on the
network (remote user)
Peer-to-Peer
 Security: making computers and data safe from harm
and unauthorized access.
 Security consists of setting a password on a resources
such as a folder that is shared on the network.
 All users set their own security
 Shared resources can exist on any computer rather than
on a centralized server only.
 Consequently, centralized control is difficult to maintain.
 Low security because some users may not implement
any security measures at all.
Peer-to-Peer
 Training
 Users need training before they are able to function
properly as both users & administrators of their
computers.
Peer-to-Peer
 Inexpensive
 Easy to set-up
 Used for small offices
 Reasonable number of users is 10
 Easy to maintain
Server-Based Networks
 In a environment with more than 10 users, a peer-to-peer will
properly not be adequate.
 Therefore, most networks have dedicated servers.
 Dedicated server: is one that functions only as server and is
not used as client or workstation
 Server: A powerful computer sometimes with a huge
processing power
 There are different types (e.g. file, print server, application,
mail, proxy, DHCP and DNS servers)
 The heart of the network, if it goes down, network will loose a
lot!
Server-Based Network
Server Client Client Client
Client
Resources
Specialized Servers
 As network increase in size, more than one server is
usually needed.
 File & Print Servers
 Manage user access and use of file and printers
resources.
Specialized Servers.
 Application servers
 Server store vast amount of data that is organized to
make it easy to retrieve.
 Application server differ from file and print server.
 With file & print server: the data or file is downloaded
to the computer making the request.
Specialized Servers
 Mail Servers
 Operate like application servers in that there
are separate server and client applications,
with data selectively downloaded from the
server to the client. (E.g. MS Exchange)
Specialized Servers
 Fax server
 Manage fax traffic into and out of the network by
sharing one or more fax modem boards.
 Communications servers
 Handle data flow and email messages between the
servers’ own networks and other networks, or
remote users.
Specialized Servers
 Directory service Servers
 Enable users to locate, store, and secure
information on the network.
 For example: some server software combines
computers into logical grouping called domains.
Server-Based Network
 Most of the mentioned functionality can be
found on one platform (e.g. Windows 2000 /
2003 Server has the following:
 DHCP and DNS servers
 Proxy server (IIS 5.0)
 File Server
 Printer Server
 For mail server, you should get MS
Exchange
The Role of software in Server-
based Networks
 A network server and its operating system work
together as a unit.
 No matter how powerful or advanced a server might be,
it is useless without an operating system
 Operating system takes advantages of its physical
resources
 Examples of server operating system: Microsoft and
Novell.
Server-Based (Advantages(
Centralized security policies can be imposed
East to back-up data
Centralized administration (Network
Administrator(
Better Performance
More secure
Synchronized Files
Server-Based (Disadvantages(
Dependent on the network administrator
Sometimes expensive server
Dr. Kamal Gulati
Associate Professor |
University Quality Support Head |
Mentoring Programme Coordinator
]Ph. D., M.Sc. (Computer Science), M.C.A., M.B.A[
Professional Certifications:
Certified Microsoft Innovative Educator
Data Science 101 Certification from Big Data University
R Language 101 Certification from Big Data University
SQL Certification from SOLOLEARN.com
Certified IBM Big Data 101 from Big Data University
R Program & Python Certified from DataCamp
Wiley Certified Big Data Analyst ]WCBDA[
Certification on DBMS from IIT Mumbai
Certified Cisco Certified Network Associate ]CCNA[
Certified Microsoft Certified Professional ]MCP[
Certified Brainbench in Computer Fundamentals, Microsoft Access, MySQL 5.7 Administration &
Microsoft Project
•Worked as Visiting Professor with Stratford University, USA for six months
from Jan’2016 to June’2016.
•Also worked at Bahrain University in Kingdom of Bahrain Sr. I.T. Faculty
(Computer Science Department) for Period of 2 Years.
•Have rich experience in the field of teaching and research in Computer
Science and Information Technology for almost 15+ years in Academia.
•Having experience of working with both private and public institutions and
universities as the lecturer and self-instruction material writer for Information
Technology courses.
•Had number of research papers published in national and international journals
and conference proceedings in IEEE and Scopus Index.
•Also chaired various National and International Conferences of repute and
associated with various International Journals as Editorial Board Member for
International and National, Academic Adviser and Research Paper Reviewer.
My current area of interest: Big Data Analytics, R Software, Management
Information System, IT Project Management, Decision Support System,
Business Analytics, Database Management System, Data Networking and
Advanced Excel with Visual Basic Macros.
Country Visited: USA, Canada, UK, UAE, Bahrain, Oman (Mostly for Teaching
and Research Purpose)
Profile of Dr. Kamal Gulati
Technical Program Committee for International Conference on Data, Engineering and
Applications 2017 (IDEA-2k17) which would be on October 28-29, 2017 at Bhopal.
http://www.ideaconference.in
Advisory Board Committee Member for International Conference on Energy, Communication,
Data Analytics and Soft Computing (ICECDS) which would be on 1-2 August 2017 at SKR
Engineering College, Poonamallee, Tamil Nadu, India.http://ecds.org.in
Advisory Committee Member for International Conference on Innovative Research in
Engineering and Science which would be on 16-17 June 2017 at Asian Institute of Technology
Conference Center Thailand.http://www.iresconf.org
Advisory Committee Member for International Conference on Cloud Computing and Internet of
everything which held on 10-11 Feb’2016 at Delhi-NCR.http://www.ccioet.org
Technical Committee member for InCITe-2016 (International Conference on Information
Technology) Theme - Internet of Things: Connect Your Worlds, IT Summit, Amity University
2016 which held on 06-07 Oct, 2016. http://www.amity.edu/incite2016
Technical Speaker for Global perspective on IT business “The Changing Scenario” – Big Data
on International Students Conference New Delhi (ISCND) which held on 14-15 Oct, 2016
http://iscnd.com
Advisory Committee Member for International Conference on Sustainable Computing
Techniques in Engineering, Science and Management which has held on 09-10 Sep’2016 at
Delhi-NCR. http://www.scesm.org
Technical Program Committee Member for Program Committee Member for International
Conference on Recent Trends IN ICT, Jaipur, India, Aug 18-19, 2017 http://rtict.org
Program Committee Member for International Conference on Recent Advancement in Computer
and Communication Bhopal, India, (IC-RAC-2017) May 26-27, 2017 http://www.icrac.co.in
Profile Contd….
Editorial Board member for the following International Journals:
International Journal of Computer Science and Innovation
http://www.infinitysciences.org
International Journal of Latest Research in Engineering and
Technology http://www.ijlret.com
International Journal of Latest Trends in Engineering and Technology
http://www.ijltet.org
InternationalJournalofApplicationorInnovationinEngineering
&Management http://www.ijaiem.org
International Journal for Management http://www.ijm-apm.com
ITM International Journal of Innovations in Science, Engineering &
Management www.iijisem.org
The International Journal of Emerging Engineering and Embedded
Systems http://www.ijeees.org
Conference Info http://conferenceinfo.org/tpc.php
International Journal of Computer Engineering in Research Trends
(IJCERT) http://www.ijcert.org

Expert Speaker for Program “Insurance Beyond Doubt” Presented by Oriental Insurance Co Ltd.
Profile Contd….
BOOK, CHAPTER, and CASE STUDY Published
Published Book on “A Study of Changing Trends in E-CRM of
Indian Insurance Industry” Published by LAP Lambert Academic
Publishing, one of the top researchers and renowned scientists
of Germany with ISBN: 3330009543, 9783330009547. The Book
available at Amazon.com.
Published Real Case Study on “IoT Security Considerations for
Higher Education” published on Business Cases - RENVOI 2017
BOOK (The Case Centre, UK) with ISBN: 978-1-4828-8840-9,
Page 63-70. The Book available at the various online website:
Amazon, AbeBooks, Chegg, Barnes & Noble.
Published Chapter on "Role of eWorld in Insurance Innovation"
Published by Insurance Institute of India (III), 60 Years Diamond
Jubilee, Compendium, Nov 2016 – (Magazine) – One of the
premium Insurance Institute of India.
Contact Details
Email : drkamalgulati@gmail.com
Website : http://mybigdataanalytics.in
LinkedIn : https://in.linkedin.com/in/drkamalgulati

More Related Content

What's hot (20)

PPT
Data Base Management System
PPTX
peer to peer and client server model
PPTX
Network and System Administration chapter 2
PPTX
System and network administration network services
PPT
Domain name system
PPTX
Basic Server PPT (THDC)
PPTX
Characteristics of cloud computing
PPT
Cloud computing
PPTX
Data Center Networks
PPTX
Network and System Administration
DOCX
Computer networking
PPTX
raid technology
PPTX
Networking
PPTX
Unit-I Introduction to Cloud Computing.pptx
PPTX
Lecture 1 ddbms
PPTX
My Presentation on Cloud Computing
PPTX
Client server model
PPTX
Storage Area Network(SAN)
PPTX
Peer to peer
Data Base Management System
peer to peer and client server model
Network and System Administration chapter 2
System and network administration network services
Domain name system
Basic Server PPT (THDC)
Characteristics of cloud computing
Cloud computing
Data Center Networks
Network and System Administration
Computer networking
raid technology
Networking
Unit-I Introduction to Cloud Computing.pptx
Lecture 1 ddbms
My Presentation on Cloud Computing
Client server model
Storage Area Network(SAN)
Peer to peer
Ad

Similar to Basic of Networking (20)

PPT
Synapse india reviews abot Networking Concept
PPTX
E content network
PPTX
UNIT ONE HANDOUT FOR Tvet student in 1.pptx
PPT
ch01.ppt
PDF
BASIC_COMPUTER_NETWORKING (1).pdf
PPTX
Computer network
PPT
Chapter01 -- introduction to networking
PPT
Introduction to networking
PPT
Networking course khurram shahzad
PPTX
1. introduction to computer networks, data communication, types of networks, ...
PDF
Network administration Book
PPTX
Computer software part 3
PDF
unit 4 cds computer networking notesnotes.pdf
PPT
Networking
PPT
Introduction computer networking
PDF
Data Communications and Networks
PPTX
Computer networks7
PPT
Introduction Computer Networking2 for basics
PPTX
Chapter One Network nile.pptx
PPT
Chapter 1 - Introduction to the basic concepts of networks.ppt
Synapse india reviews abot Networking Concept
E content network
UNIT ONE HANDOUT FOR Tvet student in 1.pptx
ch01.ppt
BASIC_COMPUTER_NETWORKING (1).pdf
Computer network
Chapter01 -- introduction to networking
Introduction to networking
Networking course khurram shahzad
1. introduction to computer networks, data communication, types of networks, ...
Network administration Book
Computer software part 3
unit 4 cds computer networking notesnotes.pdf
Networking
Introduction computer networking
Data Communications and Networks
Computer networks7
Introduction Computer Networking2 for basics
Chapter One Network nile.pptx
Chapter 1 - Introduction to the basic concepts of networks.ppt
Ad

More from Amity University | FMS - DU | IMT | Stratford University | KKMI International Institute | AIMA | DTU (20)

PPTX
Concept of Governance - Management of Operational Risk for IT Officers/Execut...
PPTX
Models of SDLC (Software Development Life Cycle / Program Development Life Cy...
PPTX
CLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKET
Concept of Governance - Management of Operational Risk for IT Officers/Execut...
Models of SDLC (Software Development Life Cycle / Program Development Life Cy...
CLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKET

Recently uploaded (20)

PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Basic Mud Logging Guide for educational purpose
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Institutional Correction lecture only . . .
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
Pharma ospi slides which help in ospi learning
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Pre independence Education in Inndia.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Basic Mud Logging Guide for educational purpose
human mycosis Human fungal infections are called human mycosis..pptx
Abdominal Access Techniques with Prof. Dr. R K Mishra
Microbial disease of the cardiovascular and lymphatic systems
VCE English Exam - Section C Student Revision Booklet
Anesthesia in Laparoscopic Surgery in India
Institutional Correction lecture only . . .
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Final Presentation General Medicine 03-08-2024.pptx
Pharmacology of Heart Failure /Pharmacotherapy of CHF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPH.pptx obstetrics and gynecology in nursing
Pharma ospi slides which help in ospi learning
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Pre independence Education in Inndia.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Week 4 Term 3 Study Techniques revisited.pptx

Basic of Networking

  • 2. What is Networking?  Definition: A network connects two or more computers so that they can share information, applications or resources.
  • 3. Networking  Networks are simply a collection of resources connected by cable or other media so they can share information  Networks made sharing data much easier and more efficient for users.
  • 4. Network: To connect two or more computers together with the ability to communicate with each other
  • 5. Examples of Shared Resources  Printers  Fax devices  Files and Folders (Data)  Modems
  • 6. Example of Services  Email  Database  Internet Access
  • 7. Hardware tools / Network Components used in connecting system’s for a Network  NIC (Network Interface Card) or Ethernet  HUB (Repeater)  SWITCH  Transmission Medium – Cables / Wires, Connectors.  ROUTER  BRIDGE  MODEM  GATEWAY  WIRELESS CARD
  • 8. Network Components  Server : Powerful machine with a robust performance and power (e.g. Windows NT, 2000 Server, 2003 Server, Longhorn, Enterprise Linux)  Client: Uses the server’s services – any machine running a client software (e.g. Windows 3.11, 95, 98, ME, 2000, XP, Vista, 7, 8 etc ……)  Peer: Acts as both Client and Server
  • 9. Network Components  Media: Bounded (UTP, STP or Coax.) or unbounded( Satellite, Microwave or wireless)  Resources: anything that client uses  User: any person using the resources  Protocols: the rules of communication (TCP/IP, IPX/SPX,…..)
  • 10. Network Components Server Client Client Client Client Resources
  • 11. Networking  All systems on the link must follow a set of common communication rules called protocols.
  • 12. Networking Models  Peer-to-Peer  Server-Based It is important to remember that one type of networking configuration is not necessarily better than another.
  • 13. Peer-to-Peer  There are no dedicated servers  All the computers are equals and therefore are known as peer.  Each computer functions as both client and server,  No administrator  Each user determine what data to share
  • 15. Features of peer-to-peer network =<Size =<Cost =<Operating Systems =<Implementation =<Administration =<Sharing resources =<Server requirements =<Security
  • 16. Peer-To-Peer  Size  Peer-to-peer is called “workgroup”  Workgroup: small group of computers  In peer-to-peer there are 10 or less computers.
  • 17. Peer-To-Peer  Cost:  Is simple  Each computer functions as client and server, so there is no need to central server  Less expensive than server-based networks.
  • 18. Peer-To-Peer  Operating Systems  No additional software is required to set up a peer- to-peer network.
  • 19. Peer-to-Peer  Implementation  Peer-to-Peer implementation offers the following advantages:  Computers are located at users’ desks.  Users act as their own administrators and plan their own security.  Computers in the network are connected by a simple, easily visible cabling system.
  • 20. Peer-to-Peer  Where a Peer-to-Peer is appropriate  There are 10 users or fewer.  Users share resources, such as files and printers, but no specialized servers exist.  Security is not an issue  The organization and the network will experience only limited growth within the foreseeable future.
  • 21. Peer-to-Peer  Administration  Network administration tasks include:  Managing users and security  Making resources available  Maintaining applications and data  Installing and upgrading application & operating system software.
  • 22. Peer-to-Peer  Sharing resources  All users can share any of their resources in any manner they choose.  Resources include: data, printers, fax cards, and so on.  Server requirements  In a peer-to-peer, each computer must:  Use a large percentage of its resources to support the users (local user).  Use additional resources such as hard-disk space and memory to support user’s accessing resource on the network (remote user)
  • 23. Peer-to-Peer  Security: making computers and data safe from harm and unauthorized access.  Security consists of setting a password on a resources such as a folder that is shared on the network.  All users set their own security  Shared resources can exist on any computer rather than on a centralized server only.  Consequently, centralized control is difficult to maintain.  Low security because some users may not implement any security measures at all.
  • 24. Peer-to-Peer  Training  Users need training before they are able to function properly as both users & administrators of their computers.
  • 25. Peer-to-Peer  Inexpensive  Easy to set-up  Used for small offices  Reasonable number of users is 10  Easy to maintain
  • 26. Server-Based Networks  In a environment with more than 10 users, a peer-to-peer will properly not be adequate.  Therefore, most networks have dedicated servers.  Dedicated server: is one that functions only as server and is not used as client or workstation  Server: A powerful computer sometimes with a huge processing power  There are different types (e.g. file, print server, application, mail, proxy, DHCP and DNS servers)  The heart of the network, if it goes down, network will loose a lot!
  • 27. Server-Based Network Server Client Client Client Client Resources
  • 28. Specialized Servers  As network increase in size, more than one server is usually needed.  File & Print Servers  Manage user access and use of file and printers resources.
  • 29. Specialized Servers.  Application servers  Server store vast amount of data that is organized to make it easy to retrieve.  Application server differ from file and print server.  With file & print server: the data or file is downloaded to the computer making the request.
  • 30. Specialized Servers  Mail Servers  Operate like application servers in that there are separate server and client applications, with data selectively downloaded from the server to the client. (E.g. MS Exchange)
  • 31. Specialized Servers  Fax server  Manage fax traffic into and out of the network by sharing one or more fax modem boards.  Communications servers  Handle data flow and email messages between the servers’ own networks and other networks, or remote users.
  • 32. Specialized Servers  Directory service Servers  Enable users to locate, store, and secure information on the network.  For example: some server software combines computers into logical grouping called domains.
  • 33. Server-Based Network  Most of the mentioned functionality can be found on one platform (e.g. Windows 2000 / 2003 Server has the following:  DHCP and DNS servers  Proxy server (IIS 5.0)  File Server  Printer Server  For mail server, you should get MS Exchange
  • 34. The Role of software in Server- based Networks  A network server and its operating system work together as a unit.  No matter how powerful or advanced a server might be, it is useless without an operating system  Operating system takes advantages of its physical resources  Examples of server operating system: Microsoft and Novell.
  • 35. Server-Based (Advantages( Centralized security policies can be imposed East to back-up data Centralized administration (Network Administrator( Better Performance More secure Synchronized Files
  • 36. Server-Based (Disadvantages( Dependent on the network administrator Sometimes expensive server
  • 37. Dr. Kamal Gulati Associate Professor | University Quality Support Head | Mentoring Programme Coordinator ]Ph. D., M.Sc. (Computer Science), M.C.A., M.B.A[ Professional Certifications: Certified Microsoft Innovative Educator Data Science 101 Certification from Big Data University R Language 101 Certification from Big Data University SQL Certification from SOLOLEARN.com Certified IBM Big Data 101 from Big Data University R Program & Python Certified from DataCamp Wiley Certified Big Data Analyst ]WCBDA[ Certification on DBMS from IIT Mumbai Certified Cisco Certified Network Associate ]CCNA[ Certified Microsoft Certified Professional ]MCP[ Certified Brainbench in Computer Fundamentals, Microsoft Access, MySQL 5.7 Administration & Microsoft Project
  • 38. •Worked as Visiting Professor with Stratford University, USA for six months from Jan’2016 to June’2016. •Also worked at Bahrain University in Kingdom of Bahrain Sr. I.T. Faculty (Computer Science Department) for Period of 2 Years. •Have rich experience in the field of teaching and research in Computer Science and Information Technology for almost 15+ years in Academia. •Having experience of working with both private and public institutions and universities as the lecturer and self-instruction material writer for Information Technology courses. •Had number of research papers published in national and international journals and conference proceedings in IEEE and Scopus Index. •Also chaired various National and International Conferences of repute and associated with various International Journals as Editorial Board Member for International and National, Academic Adviser and Research Paper Reviewer. My current area of interest: Big Data Analytics, R Software, Management Information System, IT Project Management, Decision Support System, Business Analytics, Database Management System, Data Networking and Advanced Excel with Visual Basic Macros. Country Visited: USA, Canada, UK, UAE, Bahrain, Oman (Mostly for Teaching and Research Purpose) Profile of Dr. Kamal Gulati
  • 39. Technical Program Committee for International Conference on Data, Engineering and Applications 2017 (IDEA-2k17) which would be on October 28-29, 2017 at Bhopal. http://www.ideaconference.in Advisory Board Committee Member for International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS) which would be on 1-2 August 2017 at SKR Engineering College, Poonamallee, Tamil Nadu, India.http://ecds.org.in Advisory Committee Member for International Conference on Innovative Research in Engineering and Science which would be on 16-17 June 2017 at Asian Institute of Technology Conference Center Thailand.http://www.iresconf.org Advisory Committee Member for International Conference on Cloud Computing and Internet of everything which held on 10-11 Feb’2016 at Delhi-NCR.http://www.ccioet.org Technical Committee member for InCITe-2016 (International Conference on Information Technology) Theme - Internet of Things: Connect Your Worlds, IT Summit, Amity University 2016 which held on 06-07 Oct, 2016. http://www.amity.edu/incite2016 Technical Speaker for Global perspective on IT business “The Changing Scenario” – Big Data on International Students Conference New Delhi (ISCND) which held on 14-15 Oct, 2016 http://iscnd.com Advisory Committee Member for International Conference on Sustainable Computing Techniques in Engineering, Science and Management which has held on 09-10 Sep’2016 at Delhi-NCR. http://www.scesm.org Technical Program Committee Member for Program Committee Member for International Conference on Recent Trends IN ICT, Jaipur, India, Aug 18-19, 2017 http://rtict.org Program Committee Member for International Conference on Recent Advancement in Computer and Communication Bhopal, India, (IC-RAC-2017) May 26-27, 2017 http://www.icrac.co.in Profile Contd….
  • 40. Editorial Board member for the following International Journals: International Journal of Computer Science and Innovation http://www.infinitysciences.org International Journal of Latest Research in Engineering and Technology http://www.ijlret.com International Journal of Latest Trends in Engineering and Technology http://www.ijltet.org InternationalJournalofApplicationorInnovationinEngineering &Management http://www.ijaiem.org International Journal for Management http://www.ijm-apm.com ITM International Journal of Innovations in Science, Engineering & Management www.iijisem.org The International Journal of Emerging Engineering and Embedded Systems http://www.ijeees.org Conference Info http://conferenceinfo.org/tpc.php International Journal of Computer Engineering in Research Trends (IJCERT) http://www.ijcert.org  Expert Speaker for Program “Insurance Beyond Doubt” Presented by Oriental Insurance Co Ltd. Profile Contd….
  • 41. BOOK, CHAPTER, and CASE STUDY Published Published Book on “A Study of Changing Trends in E-CRM of Indian Insurance Industry” Published by LAP Lambert Academic Publishing, one of the top researchers and renowned scientists of Germany with ISBN: 3330009543, 9783330009547. The Book available at Amazon.com. Published Real Case Study on “IoT Security Considerations for Higher Education” published on Business Cases - RENVOI 2017 BOOK (The Case Centre, UK) with ISBN: 978-1-4828-8840-9, Page 63-70. The Book available at the various online website: Amazon, AbeBooks, Chegg, Barnes & Noble. Published Chapter on "Role of eWorld in Insurance Innovation" Published by Insurance Institute of India (III), 60 Years Diamond Jubilee, Compendium, Nov 2016 – (Magazine) – One of the premium Insurance Institute of India.
  • 42. Contact Details Email : drkamalgulati@gmail.com Website : http://mybigdataanalytics.in LinkedIn : https://in.linkedin.com/in/drkamalgulati