Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Class notes

Computer Networks

Rating
-
Sold
-
Pages
11
Uploaded on
19-05-2023
Written in
2022/2023

This document has basics of computer Networks and a detailed information of osi model

Institution
Course

Content preview

COMPUTER NETWORKS
Security is very important not only in real life even for computer networks too
and the last phase of the computer network will cover the need for security and
how security is provided in computer networks. A computer network is a set of
nodes connected by communication links. A computer is a node because a
computer can send data as well as receive data. A node can be a computer
printer or any other device capable of sending or receiving data. Many devices
like switches bridges and routers are also called as nodes.
It is a set of nodes connected by communication links where that link can be a
wired link or a wireless link. The devices which are the source or the destination
in the communication are called as n devices the devices which forwards the
data from one side to another side are called n devices.

Basic Characteristics
• Fault tolerance
• Scalability
• Quality of service
• Security
Fault Tolerance
Fault tolerance is the ability of a computer network to continue working despite
failures and ensuring that there is no loss of service. For example, if there is a
problem within the network, it should still work even after the failure.
One example of fault tolerance is when a router fails, and instead of forwarding
data through the failed route, it forwards it to another route to ensure that
communication between two entities is not affected.
Scalability
Scalability is the ability of a computer network to grow based on its needs and
have good performance even after growth. The best example of a scalable
network is the internet, which handles new devices connecting and
communicating with each other efficiently.
Quality of Service
Quality of Service is the ability of a network to set priorities and manage data
traffic to reduce data loss and delays. For example, if a router receives two

, packets at the same time, it should prioritize which data to process first. This is
especially important in real-time communication, where delays are not
accepted.
Security
Security is the ability of a computer network to prevent unauthorized access,
misuse, or forgery. It should also provide confidentiality, integrity, and
availability of data. Attackers can steal confidential information, involve in
forgery, and deface web servers, making security an essential characteristic for a
computer network.

Network Protocols & Communications
Protocols are a set of rules that govern data communication, determining what is
communicated, how it is communicated, and when it is communicated. The five
elements of a protocol - message encoding, message formatting and
encapsulation, message timing, message size, and message delivery options -
are reviewed. Protocols convert data into signals or waves, with message
formatting and encapsulation adding source and destination IP addresses to
packets. Message timing is important to ensure that flow control is maintained,
and protocols help with this by specifying how much data can be sent at once.
Overall, protocols help to maintain effective communication by ensuring that
communication is standardized and organized.
The sender must wait for an acknowledgment to ensure that the data has been
received by the destination. The video also explains the concept of message
size, highlighting how larger files are broken down into smaller segments and
numbered sequentially to ensure proper reassembly and to identify any missing
packets. The three types of communication - unicast, multicast, and
broadcasting - are explained, along with the concepts of peer-to-peer and client-
server networks.

Components of a Computer Network
The components of a computer network, including nodes, media, and services.
Nodes
• A node can send or receive data and can be an end device or an
intermediary device.
• End devices are the starting or ending point of communication between
two devices.

Written for

Institution
Course

Document information

Uploaded on
May 19, 2023
Number of pages
11
Written in
2022/2023
Type
Class notes
Professor(s)
Praneeth
Contains
All classes

Subjects

$3.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
bpraneeth374

Get to know the seller

Seller avatar
bpraneeth374 JNTU
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
2 year
Number of followers
0
Documents
1
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions