Computer Network Tutorial

Introduction of Computer Network Types of Computer Network Network Topology Computer Networking Architecture Transmission Modes (Data Flow) Basic Networking Devices Integrate Services Digital Network (ISDN)


OSI Model TCP/IP Model

Physical Layer

Digital Transmission Analog Transmission Transmission Media Switching

Data Link Layer

Error detection and Error correction Data Link Control Multiple Access Aloha

Network Layer

Network Layer - Logical Address Address Mapping Unicast Routing Protocol

Transport Layer

Process to Process Delivery User Datagram Protocol Transmission Control Protocol Stream Control Transmission Protocol Session Layer and Presentation Layer

Application Layer

Domain Name System Application Protocol E-mail Cryptography


Classes of Routing Protocols Classification of Routing Algorithms Controlled Access Protocols in Computer Networks Differences between IPv4 and IPv6 Fixed and Flooding Routing Algorithms Advantages and Disadvantages of Fibre Optics Cable APIPA Difference between Active and Passive FTP Fiber Optics and its Types Method of Joining and Fusion of Fiber Optic Cable Define Framing in Computer Network Disadvantages of Computer Network Mesh Topology Diagram in Computer Network Ring Topology in Computer Network Star Topology in Computer Networks 4G Mobile Communication Technology Advantages and Disadvantages of LAN Advantages and Disadvantages of MAN Advantages and Disadvantages of WAN Application Layer in OSI Model Cyclic Redundancy Check Example Data link layer in OSI model Difference between Transport and Network Layer Hamming Code Example Network Layer in OSI Model Session Layer in OSI Model Transport Layer in OSI Model Two Port Network in Computer Networks Uses of Computer Networks What is Computer Network What is Framing in a Computer Network Advantages and Disadvantages of Bus Topology Difference between Star Topology and Bus Topology Subnetting in Computer Network Subnetting Questions and Answers What is Bus Topology What is Network Topology and Types in Computer Networks Access Control in Networking Basic Characteristics of Computer Network Benefits of SOCKS5 Proxy in Computer Networks Computer Network viva Questions Difference between BOOTP and RARP Difference Between Network Topologies and Network Protocols Difference between NFC and RFID Difference Between Point-to-Point Link and star Topology Network Differences Between MSS and MTU Differences Between Trunk Port and Access Port Different Modes of Communication in Computer Networks MIME Protocol in Computer Networks Modes of Communication in Computer Networks Network Attack in Computer Network Port Address in Networking Simplest Protocol in Computer Network Sliding Window Protocol in Computer Network Stop And Wait Protocol in Computer Networks TCP 3-Way Handshake Process in Computer Networks What is a Proxy Server What is APPN What is ICMP Protocol What is Point-to-Point Protocol What is Port Address in Networking What is the HDLC Protocol What is VRRP Protocol Difference Between Analog and Digital Signals Difference Between Hub and Repeater Difference between Repeater and Switch Difference Between Transparent Bridge and Source Routing Bridge Source Routing Bridge in Computer Networks Transparent Bridge in Computer Networks Transport Protocol in Computer Networks Types of CSMA in Computer Networks What is Wired and Wireless Networking Network Security in Computer Network Disadvantages of Extranet Difference Between TELNET and FTP Define Protocol in Computer Networks Guided Transmission Media in Computer Network What is a Gateway in a Computer Network IGMP in Computer Networks LAN Protocols in Computer Networks MAN Meaning in Computer Modulation Techniques in Computer Networks Switching in DCN TCP/IP Applications What is IGMP? What is Modem in Networking What is Non-Persistent CSMA Difference between Cell Splitting and Cell Sectoring Forouzen Computer Network Open Loop and Closed Loop Congestion Control Types of Cluster Computing WAP-Wireless Access Point What are the elements of the Transport Protocol Difference between Gateway and Switch Flow Control in Data Link Layer Body Area Network Flooding in Computer Network Token Ring in Computer Networks VoIP in Computer Networks What is Infrared Transmission Congestion Control Techniques Forward Error Correction (FEC) Switching Techniques What is Telnet in Computer Network What are the Types of IPv4 Addresses IEEE 802.6 (DQDB) IEEE 802.15.4 Technology What is HDLC (High-level Data Link Control)? What is SMS Hubbing in Telecom? Circuit Switching in Computer Networks Communication Satellites in Computer Networks Features of HTTP Protocol IMAP4 (Internet Message Access Protocol) Internet Services How to Set up a Wireless Router Internetwork Routing in Computer Networks Distributed Computing System Features of GSM The 802.11 MAC Sublayer Protocol What is IEEE 802.3? What are Hubs and Switches in Computer Networks? What is Modem in a Computer Network? What is multicasting in Computer Networks? GSM -The Mobile Station What is Network Server? Slotted Aloha in Computer Network What is Ethernet in Computer Networks What is Arpanet? Radio Access Network (RAN) TCP 3-Way Handshake Process PING SWEEP (ICMP SWEEP) Print Server Private IP Address Security Services in Computer Networks Protocol Data Unit (PDU) CSMA with Collision Avoidance (CSMA/CA) What is Gateway in Computer Network? Advantages of Networking Data Link Layer Design Issues DHCP in Computer Networks Internet Security Association and Key Management Protocol (ISAKMP) What is Switch Hub? Telnet Full form in Networking Multimedia Systems Quality of Service in Computer Networks What is Carrier Sense Multiple Access (CSMA)? What is Circuit Switching What is Duplex Network? What is Web Protocol Network LAN Technologies Classes in Computer Network Low-Density Parity Check (LDPC) Wireless Internet Service Providers(Wisps) What is Handshaking? Cache Server What Is WSN Network? Check Sum Error Detection Linear Bus Topology Functions of the Transport Layer Infrared Transmission in Computer Networks Digital Signal in Computer Network Digital Data Transmission in Computer Networks Define Checksum with Example Computer Network Security Requirements Brust Errors in Computer Network Back Side Bus (BSB) 2-Dimension Parity Check in Computer Network Router and Brouter Microwave Transmission in Computer Networks Magnetic Media in Computer Network A One-Bit Sliding Window Protocol CDMA-Near-Far Problem Reference Models in Computer Networks Uni-cast, Broadcast, and Multicast in Computer Networks Uses Of Bridges in Computer Networks What are Gateways in Computer Network?

Computer Network viva Questions

1. What is a computer network?

A computer network is a group of computers and devices that are connected together to share resources such as data, printers, and internet access.

2. What are the different types of computer networks?

 There are several types of computer networks, including:

  • Local Area Network (LAN): A LAN is a network that is limited to a small geographical area, such as a single building or campus.
  • Wide Area Network (WAN): A WAN is a network that spans a large geographical area, such as a city or country.
  • Metropolitan Area Network (MAN): A MAN is a network that spans a large metropolitan area, such as a city.
  • Personal Area Network (PAN): A PAN is a network that is used to connect devices in close proximity, such as a computer and a printer.

3. What is a network topology?

       A network topology is the arrangement of the various components (links, nodes, etc.) of a computer network. Various types of network topologies exist, including:

  • Bus topology: All devices in a bus topology are linked to one central cable, or backbone.
  • Star topology: The hub or switch in the middle of a star topology serves as the connection point for all devices.
  • Ring topology: Each device among a ring topology is connected to two more devices in a circular pattern.

4. Describe a protocol.

A network's communication between devices is governed by a set of rules and standards called a protocol. There are various kinds of protocols, such as:

  • A network's components can communicate reliably thanks to the Transmission Control Protocol (TCP).
  • A network's devices are identified and data is routed between them using the Internet Protocol (IP), which is a protocol.
  • FTP, or File Send Protocol, is a protocol often used to transfer files between computers on a network.

5. Describe a router.

 A router is a piece of hardware that connects multiple networks and routes data between them. Routers consult routing tables and protocols to decide which network to send data to.

6. What is a switch?

A switch is a piece of hardware that connects networked devices and allows data to be sent between them. Data packets are forwarded by switches in accordance with the destination, which is determined by their MAC addresses.

7. What is a hub?

A hub is a device that is used to connect devices on a network and forward data packets to all connected devices. Hubs do not have the ability to route data based on destination, unlike switches.

8. What is a LAN?

A local area network is a type of network that is restricted to a limited geographic region, often known as a campus or one building. Pcs, printer, and other devices are frequently connected using LANs to share resources inside a single space.

9. What is a WAN?

A WAN (Wide Area Network) is a network that spans a large geographical area, such as a city or country. WANs are often used to connect devices across multiple locations, such as branches of a company or schools in a district.

10.  How do VPNs work?

 A network called a Virtual Private Network is used to safely connect devices to the internet. VPNs create a secure, encrypted connection between devices, allowing them to communicate as if they were on a private network. VPNs are often used to allow remote workers to access company resources or to protect sensitive data when using public Wi-Fi networks.

11.  Describe a firewall.

An effective security tool for shielding a network from intrusions and illegal access is a firewall. Firewalls can be hardware or software-based and are used to block or allow traffic based on predetermined rules.

12. What is a peer-to-peer architecture?

A peer-to-peer architecture is a type of network architecture in which each device on the network has the ability to communicate and share resources directly with other devices on the network, without the need for a central server or authority. Each device functions as both a client and a server in a peer-to-peer network, enabling more decentralized and dispersed communication and resource sharing. Peer-to-peer networks are often used in situations where the cost or complexity of a traditional client-server network is not practical, such as in home networks or small businesses.

13. What does MAC stand for?

Each device on a network is given a specific identity known as a MAC (Media Access Control) address. Devices are identified and data is routed between them using MAC addresses.

14. What is a packet?

Data that is sent via a network is transmitted in packets. In addition to the data itself, packets also include information about the data's source and destination.

15. What is a domain name?

An online resource on the internet is identified by its domain name, which is a distinctive name. Domain names are made up of a series of letters and numbers and are used to identify the IP address of a website or server.

 16. Describe the DNS.

Domain names are converted into IP addresses using a DNS (Domain Name System). When you enter a domain name onto your computer, the DNS glances up the accompanying IP address and routes the request to the appropriate website.

 17. Describe a server.

A computer or other device that hosts services or resources that can be accessible across a network is called a server. Websites, files, and other sorts of data that are accessible by network clients can be stored on servers.

 18. What does IP stand for?

Each device on a network is given a specific identity called an IP (Internet Protocol) address. Devices are identified and data is routed between them using IP addresses.

 19. Describe a subnet.

A subnet is just a smaller network that's also established within a bigger network. A huge network is frequently divided into more manageable, more compact pieces using subnets.

20. Network interface card (NIC): What is it?

A hardware element used to join a device to a network is called a network interface card (NIC). In order to be recognized on a network, NICs are often placed in devices such as computers. Each NIC has a specific MAC address.

21. What exactly is a wireless access point (WAP)?

A device used to establish a wireless network is known as a wireless access point (WAP). WAPs enable wireless network connections by using radio frequencies to broadcast and receive data.

22. What is a modem?

Using a modem, you can attach a desktop or other device to a landline or broadband connection. Data sent via the internet or even other networks is transmitted and received using modems.

23. What is a port?

On a computer or other device, a port is a logical point of connection used for sending and receiving data via a network. Ports are used to distinguish between various types of information or services and are given a number to identify them.

24. What is a network security key?

A network security key is a password or passphrase that is used to secure a wireless network. Network security keys are used to protect the network from unauthorized access and protect the data transmitted over the network.

25. What exactly is a network bridge?

A device that joins a number of networks together is known as a network bridge. Networking bridges use routing and protocols to decide which network to send data to.

26. What exactly is a network gateway?

A network gateway is a tool that connects two or more networks and functions as a tube for data transfer between them. Router tables and protocols are used by network gateways, which can be hardware- or software-based, to select the optimal route for data to take.

27. An explanation of network security protocols

A set of guidelines and requirements known as a network security protocol is used to safeguard networks and the data that is sent across them. Network security protocols may also use access control, authentication, and encryption procedures to guard against unapproved access and assaults.

28. What does a network firewall do?

A network firewall is a security tool used to guard against intrusions or other unauthorized activity. Network firewalls are used to restrict or permit traffic depending on predefined criteria. They can be hardware or software-based.

29. An explanation of network sniffers.

A tool called a network sniffer is used to keep an eye on network activity and grab data packets for examination. Network sniffers are frequently employed for security-related tasks to monitor data transported over a network or to identify and fix network problems.

30. What exactly is a network analyzer?

A network analyzer is a system that measures, examine, and debug network traffic. A network's problems, such as sluggish performance or security holes, can be found and diagnosed with network analyzers.

31. What does a load balancer on a network do?

A device called a network load balancer is used to split up network traffic among various servers or gadgets. With the help of network load balancers, a network's performance and availability can be increased by evenly dispersing the workload among several devices.

32. What is a network traffic monitor?

A network traffic monitor is a tool that is used to monitor and analyze network traffic in real-time. Network traffic monitors can be used to identify trends and patterns in network usage, as well as to troubleshoot and diagnose issues with a network.

33. What is a network performance monitor?

A tool used to track and gauge a network's performance is called a network performance monitor. Network performance concerns, such as sluggish response times or heavy traffic, can be found with network performance monitors, and the network can then be optimized for improved performance.

34. What is a network management system?

A network management system is a software or hardware tool that is used to monitor, manage, and maintain a network. Network management systems can be used to perform tasks such as inventory management, configuration management, and performance monitoring of network devices.

35. What is a network monitoring tool?

A network monitoring tool is a software or hardware device that is used to monitor the performance and availability of a network. Network monitoring tools can be used to identify issues with network performance, such as slow response times or high levels of traffic, and to troubleshoot and diagnose problems.

36. What is a network configuration tool?

A network configuration tool is a software or hardware device that is used to manage and configure the settings and parameters of a network. Network configuration tools can be used to perform tasks such as setting up network devices, configuring network security, and managing network traffic.

37. What is a network mapping tool?

A network mapping tool is a software or hardware device that is used to create a visual representation of a network. Network mapping tools can be used to create diagrams or maps of a network, including the devices and connections within it.

38. What is a network simulator?

In a controlled setting, a network simulator is a tool that is employed to imitate the behavior and functionality of a network. Before implementing network configurations, protocol, and security procedures in a real environment, network simulators are frequently used to test them.

39. What is a network analyzer tool?

A network analyzer tool is a software or hardware device that is used to monitor and analyze network traffic. Network analyzer tools can be used to identify trends and patterns in network usage, as well as to troubleshoot and diagnose issues with a network.

40. An explanation of network security services

A service or product that is intended to safeguard a network from security risks and weaknesses is known as a network security service. Network security services can include a variety of measures, such as firewalls, intrusion prevention systems, access control measures, and ongoing security assessments and evaluations. Network security services can be provided by external companies or organizations, or can be implemented in-house by the network owner or administrator.

Network security services can be used to protect networks of all sizes and types, including small business networks, enterprise networks, and public networks. They can be provided on a subscription or fee-based model, and can be customized to meet the specific needs and requirements of the network.