Computer Networks
A network is a set of devices often referred to as nodes connected
by communication links. A node can be a computer, printer, or any
other device capable of sending and/or receiving data generated by
other nodes on the network.
How Does a Computer Network Work?
A computer network works by connecting devices (nodes) using
links (wires, cables, or wireless signals) to share data.
Nodes: Devices like computers, routers, and modems.
Links: The medium that connects nodes (wired or wireless).
Communication: Data is sent and received using protocols (set
rules).
IP Address: A unique identifier for each device in the network.
These elements work together to enable seamless data transfer
between devices.
Message Message
Sender Receiver
Connection
Client server
Message sender se reciever tak transmit hota h through
connection pr message ko smjhne ke liye protocols ki need hoti h
tabhi hum keh skte h ki Communication between sender and
receiver hua h through the network.
Inter-Process Communication (IPC) - Handled by the OS
IPC allows processes within the same computer to
communicate and share data.
Communication Between Two Computers - Handled by
Computer Networks
It enables communication between different computers over a
network.
The communication is managed by network protocols such as
TCP/IP, UDP, HTTP, FTP, etc.
Toh Computer networks ka kaam hi yhii h ki 2 physically separate
devices ke beech communication possible karwana and feel
karwana ki they are present within the same machine but they are
actually not.
Functionalities:
1. Mandatory:
a) Error Control
Purpose: Ensures data integrity by detecting and
correcting errors during transmission.
Methods Used:
Parity Bits: Adds an extra bit for error detection.
Checksums: Uses a calculated value to verify data
integrity.
Cyclic Redundancy Check (CRC): A more
advanced method for error detection.
Automatic Repeat reQuest (ARQ): Retransmits
lost or corrupted data.
b) Flow Control
Purpose: Manages data transmission rate between
sender and receiver to prevent data overflow.
Techniques Used:
Stop-and-Wait Protocol: Sender waits for
an acknowledgment (ACK) before sending
more data.
Sliding Window Protocol: Allows multiple
packets to be sent before needing an
acknowledgment, improving efficiency.
c) Multiplexing and Demultiplexing
Combines multiple data streams into a single channel
for transmission so that efficient utilization of network
resources can be done.
✅ Reduces cost: Fewer physical links required.
✅ Maximizes bandwidth usage: Prevents wastage of
unused bandwidth.
✅ Supports multiple users simultaneously: Enables
multiple data sources (e.g., voice, video, text) to share the
same medium.
✅ Enhances network scalability: More connections
can be established without additional infrastructure.
Extracts individual data streams from the combined
signal at the receiver.Ensures the correct delivery of
received data to the appropriate application or process.
✅ Identifies the right recipient: Separates different
data streams coming through a single channel.
✅ Supports multiple services: Allows multiple
applications (e.g., web browsing, video calls, file
transfers) to run simultaneously on the same device.
✅ Manages multiple connections efficiently:
Ensures that incoming packets are sent to the
correct ports/processes.
Real-Life Example
Multiplexing: When streaming a movie, sending
emails, and browsing the web simultaneously, all data travels
together over the same network.
Demultiplexing: At the receiver (your device), the
network stack separates movie data for the video player,
emails for the mail app, and web pages for the browser.
2. Optional:
a) Encryption/Decryption-
Purpose: Protects data from unauthorized access by
converting it into an unreadable format (encryption) and restoring it
to its original form (decryption).
Encryption Methods:
Symmetric Encryption (Same key for encryption & decryption,
e.g., AES, DES).
Asymmetric Encryption (Public key for encryption, private
key for decryption, e.g., RSA, ECC).
b) Checkpoint
Saves the system’s current state to allow recovery in case of
failure.
Basic Terminologies of Computer Networks
Network: A network is a collection of computers and devices that
are connected together to enable communication and data
exchange.
Nodes: Nodes are devices that are connected to a network. These
can include computers, Servers, Printers, Routers, Switches, and
other devices.
Protocol: A protocol is a set of rules and standards that govern how
data is transmitted over a network. Examples of protocols include
TCP/IP, HTTP, and FTP.
Topology: Network topology refers to the physical and logical
arrangement of nodes on a network. The common network
topologies include bus, star, ring, mesh, and tree.
Service Provider Networks: These types of Networks give
permission to take Network Capacity and Functionality on lease
from the Provider. Service Provider Networks include Wireless
Communications, Data Carriers, etc.
IP Address: An IP address is a unique numerical identifier that is
assigned to every device on a network. IP addresses are used to
identify devices and enable communication between them.
DNS: The Domain Name System (DNS) is a protocol that is used to
translate human-readable domain names (such as www.google.com)
into IP addresses that computers can understand.
Firewall: A firewall is a security device that is used to monitor and
control incoming and outgoing network traffic. Firewalls are used to
protect networks from unauthorized access and other security
threats.
Types of Enterprise Computer Networks
LAN: A Local Area Network (LAN) is a network that covers a small
area, such as an office or a home. LANs are typically used to
connect computers and other devices within a building or a campus.
WAN: A Wide Area Network (WAN) is a network that covers a large
geographic area, such as a city, country, or even the entire world.
WANs are used to connect LANs together and are typically used for
long-distance communication.
Cloud Networks: Cloud Networks can be visualized with a Wide
Area Network (WAN) as they can be hosted on public or private
cloud service providers and cloud networks are available if there is a
demand. Cloud Networks consist of Virtual Routers, Firewalls, etc.
These are just a few basic concepts of computer networking.
Networking is a vast and complex field, and there are many more
concepts and technologies involved in building and maintaining
networks. Now we are going to discuss some more concepts on
Computer Networking.
Open system: A system that is connected to the network and is
ready for communication.
Closed system: A system that is not connected to the network and
can’t be communicated wit