Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Class notes

computer networks notes

Rating
-
Sold
-
Pages
20
Uploaded on
03-03-2023
Written in
2022/2023

its used to get a detailed note about computer networks.

Institution
Course

Content preview

Computer networks
Introduction to Computer Networks
This course is mainly for the undergraduate students and
this course is useful for the students who are preparing for
their gate exams. This course can be a prerequisite course to
CCNE international certification course. Each layer is
addressed separately as a separate chapters and it is dealt
in a very detailed manner. Security is very important not
only in real life even for computer networks too and the last
phase of the computer network will cover the need for
security and how security is provided in computer networks.
A computer network is a set of nodes connected by
communication links. A computer is a node because a
computer can send data as well as receive data. A node can
be a computer printer or any other device capable of sending
or receiving data. Many devices like switches bridges and
routers are also called as nodes. A computer network is
mainly used for research and resource sharing say there are
lots of nodes involved in this internet cloud. Internet contains
lots of intermediary devices these are all intermediary
devices and these role end devices why we call this as in
device because this will be either the starting point of the
communication or the end point in the communication say
for example if this computer wants to access www. eso. org.

It is a set of nodes connected by communication links where
that link can be a wired link or a wireless link. The devices
which are the source or the destination in the communication
are called as n devices the devices which forwards the data
from one side to another side are called n devices.

There are 4 basic characteristics any computer network
should possess fault tolerance scalability scalability quality
of service and security. We shall see each of these in a
detailed manner firstly fault tolerance fault tolerance is the
ability of the computer network to continue working despite
failures and it should ensure there is no loss of service.
Scalability is a basic characteristic of the network and the
ability to grow based on the needs and have good
performance even after growth. Network the best example
for a scalable network is the internet even this moment
many new devices are connecting to internet and

, Computer networks
communicating to each other 's internet handles this
perfectly and always gives hope for the newcomers this is
what we exactly called as scalability in this example assume
100 computers are connected to router 3 and we expect our
computer network to work as like the same even after
adding these hundred devices. Security is the ability to
prevent unauthorized access misuse or forgery and not only
prevention Network should also provide confidentiality
integrity and availability. Quality of service is the main
aspect of this quality of services that it handles law also it
handles the delay now we shall see the final characteristics
of computer network that is the security.

Network Protocols & Communications :
Time now we shall see an example for half duplex
communication. Now this computer is sending data in both
directions but not at the same time, so this is half duplex.
Both sending and receiving can happen but not at the same
time. If you observe now sending is happening now receiving
is not happening, but it will happen in the future. This is
sending and this is receiving. This is not happening at the
same time. Now we shall see an example for full duplex
communication. Now this computer is sending and receiving
data at the same time, so this is full duplex. Both sending
and receiving can happen at the same time. If you observe
now sending is happening. Now receiving is happening and it
will stay that way forever. This is sending and this is
receiving. This is happening at the same time. Now we shall
see. How data communication works in a computer network?
We shall see three different cases simplex half-duplex full
duplex. We shall see all these three cases In detail. Firstly,
the simplex it is always a unidirectional communication. One
node can transmit and other will receive. For example,
keyboards just take a keyboard is connected to a [UNK]
keyboard is going to give data to the [UNK], whereas [UNK]
is not going to give any data to the keyboard. Likewise our
traditional monitors I am [UNK] talking about our touch
monitors are traditional monitors. Whatever the data is there
in the [UNK] that is going to be given to the monitor and
monitor is not going to give any information to the [UNK]. In
both the cases, the data or the communication is always

, Computer networks
unidirectional. Coming to the half duplex. The
communication is in both directions. It means it can send as.
As it can receive, but not at the same time. The very
important part about half duplex is that the communication
can happen in both directions but not at the same time. If
one device is sending the other device can receive and not
at the same time. Both sending and receiving can happen.
Example, Walkie talkie in a walkie talkie. We can talk as well
as we can but we ca n't talk and listen at the same time.
Now we shall see what are protocol in computer network
protocols are sets of rules that tell machines how to
communicate with each other. Protocols are very important
in computers because they allow machines to communicate
with each other without having to understand each other.'s
language protocols are like a set of instructions for how
machines should behave. In a particular situation. Protocols
allow machines to communicate with each other. without
having to learn each other's language protocols are also very
important because they keep computers from
misunderstanding each other.'s intentions protocol also allow
machines to interact with each other in a network.
Communication is very important because it allows two or
more devices to send and receive data asynchronously
without interruption or error. Protocols are a set of rules that
governs data communication, and these rules are essential
for ensuring that the message is properly encoded,
formatted, and encapsulated. Without proper protocol
adherence, the message can be mis understood, resulting in
a chaotic and messy communication environment.. IN
network communication, timing is also essential for ensuring
that data is routed properly, and that the size of the data
being sent is not disproportionate to the available capacity of
the network. delivery [UNK] [UNK] transmission [UNK]
transmission [UNK] transmission.

THe passage discusses the different aspects of computer
communication, and outlines the various elements that make
up a protocol.. IT also touches on the importance of protocols
in real-time settings, and provides details on three common
delivery modes...

Written for

Institution
Course

Document information

Uploaded on
March 3, 2023
Number of pages
20
Written in
2022/2023
Type
Class notes
Professor(s)
Divya kaur
Contains
All classes

Subjects

$43.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
sravankumar0409

Get to know the seller

Seller avatar
sravankumar0409
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
3 year
Number of followers
0
Documents
1
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions