KEMBAR78
Computer Networks | PDF | Computer Network | Error Detection And Correction
0% found this document useful (0 votes)
7 views5 pages

Computer Networks

A computer network consists of interconnected devices (nodes) that communicate using links and protocols to share data. Key functionalities include error control, flow control, and multiplexing, which ensure data integrity and efficient transmission. Various types of networks, such as LANs and WANs, facilitate communication over different distances and environments.

Uploaded by

Tulika Chauhan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views5 pages

Computer Networks

A computer network consists of interconnected devices (nodes) that communicate using links and protocols to share data. Key functionalities include error control, flow control, and multiplexing, which ensure data integrity and efficient transmission. Various types of networks, such as LANs and WANs, facilitate communication over different distances and environments.

Uploaded by

Tulika Chauhan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Computer Networks

A network is a set of devices often referred to as nodes connected


by communication links. A node can be a computer, printer, or any
other device capable of sending and/or receiving data generated by
other nodes on the network.

How Does a Computer Network Work?


A computer network works by connecting devices (nodes) using
links (wires, cables, or wireless signals) to share data.
Nodes: Devices like computers, routers, and modems.
Links: The medium that connects nodes (wired or wireless).
Communication: Data is sent and received using protocols (set
rules).
IP Address: A unique identifier for each device in the network.
These elements work together to enable seamless data transfer
between devices.

Message Message

Sender Receiver
Connection

Client server

Message sender se reciever tak transmit hota h through


connection pr message ko smjhne ke liye protocols ki need hoti h
tabhi hum keh skte h ki Communication between sender and
receiver hua h through the network.

Inter-Process Communication (IPC) - Handled by the OS


IPC allows processes within the same computer to
communicate and share data.

Communication Between Two Computers - Handled by


Computer Networks

 It enables communication between different computers over a


network.
 The communication is managed by network protocols such as
TCP/IP, UDP, HTTP, FTP, etc.
Toh Computer networks ka kaam hi yhii h ki 2 physically separate
devices ke beech communication possible karwana and feel
karwana ki they are present within the same machine but they are
actually not.

Functionalities:
1. Mandatory:
a) Error Control
Purpose: Ensures data integrity by detecting and
correcting errors during transmission.
Methods Used:

 Parity Bits: Adds an extra bit for error detection.


 Checksums: Uses a calculated value to verify data
integrity.
 Cyclic Redundancy Check (CRC): A more
advanced method for error detection.
 Automatic Repeat reQuest (ARQ): Retransmits
lost or corrupted data.

b) Flow Control

Purpose: Manages data transmission rate between


sender and receiver to prevent data overflow.

 Techniques Used:
 Stop-and-Wait Protocol: Sender waits for
an acknowledgment (ACK) before sending
more data.
 Sliding Window Protocol: Allows multiple
packets to be sent before needing an
acknowledgment, improving efficiency.

c) Multiplexing and Demultiplexing

Combines multiple data streams into a single channel


for transmission so that efficient utilization of network
resources can be done.
✅ Reduces cost: Fewer physical links required.
✅ Maximizes bandwidth usage: Prevents wastage of
unused bandwidth.
✅ Supports multiple users simultaneously: Enables
multiple data sources (e.g., voice, video, text) to share the
same medium.
✅ Enhances network scalability: More connections
can be established without additional infrastructure.

Extracts individual data streams from the combined


signal at the receiver.Ensures the correct delivery of
received data to the appropriate application or process.
✅ Identifies the right recipient: Separates different
data streams coming through a single channel.
✅ Supports multiple services: Allows multiple
applications (e.g., web browsing, video calls, file
transfers) to run simultaneously on the same device.
✅ Manages multiple connections efficiently:
Ensures that incoming packets are sent to the
correct ports/processes.

Real-Life Example
Multiplexing: When streaming a movie, sending
emails, and browsing the web simultaneously, all data travels
together over the same network.
Demultiplexing: At the receiver (your device), the
network stack separates movie data for the video player,
emails for the mail app, and web pages for the browser.

2. Optional:

a) Encryption/Decryption-
Purpose: Protects data from unauthorized access by
converting it into an unreadable format (encryption) and restoring it
to its original form (decryption).
Encryption Methods:
Symmetric Encryption (Same key for encryption & decryption,
e.g., AES, DES).
Asymmetric Encryption (Public key for encryption, private
key for decryption, e.g., RSA, ECC).

b) Checkpoint
Saves the system’s current state to allow recovery in case of
failure.

Basic Terminologies of Computer Networks


Network: A network is a collection of computers and devices that
are connected together to enable communication and data
exchange.

Nodes: Nodes are devices that are connected to a network. These


can include computers, Servers, Printers, Routers, Switches, and
other devices.

Protocol: A protocol is a set of rules and standards that govern how


data is transmitted over a network. Examples of protocols include
TCP/IP, HTTP, and FTP.
Topology: Network topology refers to the physical and logical
arrangement of nodes on a network. The common network
topologies include bus, star, ring, mesh, and tree.

Service Provider Networks: These types of Networks give


permission to take Network Capacity and Functionality on lease
from the Provider. Service Provider Networks include Wireless
Communications, Data Carriers, etc.

IP Address: An IP address is a unique numerical identifier that is


assigned to every device on a network. IP addresses are used to
identify devices and enable communication between them.

DNS: The Domain Name System (DNS) is a protocol that is used to


translate human-readable domain names (such as www.google.com)
into IP addresses that computers can understand.

Firewall: A firewall is a security device that is used to monitor and


control incoming and outgoing network traffic. Firewalls are used to
protect networks from unauthorized access and other security
threats.

Types of Enterprise Computer Networks


LAN: A Local Area Network (LAN) is a network that covers a small
area, such as an office or a home. LANs are typically used to
connect computers and other devices within a building or a campus.

WAN: A Wide Area Network (WAN) is a network that covers a large


geographic area, such as a city, country, or even the entire world.
WANs are used to connect LANs together and are typically used for
long-distance communication.

Cloud Networks: Cloud Networks can be visualized with a Wide


Area Network (WAN) as they can be hosted on public or private
cloud service providers and cloud networks are available if there is a
demand. Cloud Networks consist of Virtual Routers, Firewalls, etc.
These are just a few basic concepts of computer networking.
Networking is a vast and complex field, and there are many more
concepts and technologies involved in building and maintaining
networks. Now we are going to discuss some more concepts on
Computer Networking.
Open system: A system that is connected to the network and is
ready for communication.
Closed system: A system that is not connected to the network and
can’t be communicated wit

You might also like