Computer Network Tutorial

Introduction of Computer Network Types of Computer Network Network Topology Computer Networking Architecture Transmission Modes (Data Flow) Basic Networking Devices Integrate Services Digital Network (ISDN)

Model

OSI Model TCP/IP Model

Physical Layer

Digital Transmission Analog Transmission Transmission Media Switching

Data Link Layer

Error detection and Error correction Data Link Control Multiple Access Aloha

Network Layer

Network Layer - Logical Address Address Mapping Unicast Routing Protocol

Transport Layer

Process to Process Delivery User Datagram Protocol Transmission Control Protocol Stream Control Transmission Protocol Session Layer and Presentation Layer

Application Layer

Domain Name System Application Protocol E-mail Cryptography

Misc

Classes of Routing Protocols Classification of Routing Algorithms Controlled Access Protocols in Computer Networks Differences between IPv4 and IPv6 Fixed and Flooding Routing Algorithms Advantages and Disadvantages of Fibre Optics Cable APIPA Difference between Active and Passive FTP Fiber Optics and its Types Method of Joining and Fusion of Fiber Optic Cable Define Framing in Computer Network Disadvantages of Computer Network Mesh Topology Diagram in Computer Network Ring Topology in Computer Network Star Topology in Computer Networks 4G Mobile Communication Technology Advantages and Disadvantages of LAN Advantages and Disadvantages of MAN Advantages and Disadvantages of WAN Application Layer in OSI Model Cyclic Redundancy Check Example Data link layer in OSI model Difference between Transport and Network Layer Hamming Code Example Network Layer in OSI Model Session Layer in OSI Model Transport Layer in OSI Model Two Port Network in Computer Networks Uses of Computer Networks What is Computer Network What is Framing in a Computer Network Advantages and Disadvantages of Bus Topology Difference between Star Topology and Bus Topology Subnetting in Computer Network Subnetting Questions and Answers What is Bus Topology What is Network Topology and Types in Computer Networks Access Control in Networking Basic Characteristics of Computer Network Benefits of SOCKS5 Proxy in Computer Networks Computer Network viva Questions Difference between BOOTP and RARP Difference Between Network Topologies and Network Protocols Difference between NFC and RFID Difference Between Point-to-Point Link and star Topology Network Differences Between MSS and MTU Differences Between Trunk Port and Access Port Different Modes of Communication in Computer Networks MIME Protocol in Computer Networks Modes of Communication in Computer Networks Network Attack in Computer Network Port Address in Networking Simplest Protocol in Computer Network Sliding Window Protocol in Computer Network Stop And Wait Protocol in Computer Networks TCP 3-Way Handshake Process in Computer Networks What is a Proxy Server What is APPN What is ICMP Protocol What is Point-to-Point Protocol What is Port Address in Networking What is the HDLC Protocol What is VRRP Protocol Difference Between Analog and Digital Signals Difference Between Hub and Repeater Difference between Repeater and Switch Difference Between Transparent Bridge and Source Routing Bridge Source Routing Bridge in Computer Networks Transparent Bridge in Computer Networks Transport Protocol in Computer Networks Types of CSMA in Computer Networks What is Wired and Wireless Networking Network Security in Computer Network Disadvantages of Extranet Difference Between TELNET and FTP Define Protocol in Computer Networks Guided Transmission Media in Computer Network What is a Gateway in a Computer Network IGMP in Computer Networks LAN Protocols in Computer Networks MAN Meaning in Computer Modulation Techniques in Computer Networks Switching in DCN TCP/IP Applications What is IGMP? What is Modem in Networking What is Non-Persistent CSMA Difference between Cell Splitting and Cell Sectoring Forouzen Computer Network Open Loop and Closed Loop Congestion Control Types of Cluster Computing WAP-Wireless Access Point What are the elements of the Transport Protocol Difference between Gateway and Switch Flow Control in Data Link Layer Body Area Network Flooding in Computer Network Token Ring in Computer Networks VoIP in Computer Networks What is Infrared Transmission Congestion Control Techniques Forward Error Correction (FEC) Switching Techniques What is Telnet in Computer Network What are the Types of IPv4 Addresses IEEE 802.6 (DQDB) IEEE 802.15.4 Technology What is HDLC (High-level Data Link Control)? What is SMS Hubbing in Telecom? Circuit Switching in Computer Networks Communication Satellites in Computer Networks Features of HTTP Protocol IMAP4 (Internet Message Access Protocol) Internet Services How to Set up a Wireless Router Internetwork Routing in Computer Networks Distributed Computing System Features of GSM The 802.11 MAC Sublayer Protocol What is IEEE 802.3? What are Hubs and Switches in Computer Networks? What is Modem in a Computer Network? What is multicasting in Computer Networks? GSM -The Mobile Station What is Network Server? Slotted Aloha in Computer Network What is Ethernet in Computer Networks What is Arpanet?

Uses of Computer Networks

During the twentieth century, the most significant technology is information collecting, processing, and distribution. Computers and communications have been integrated, which has considerably influenced the organization of computer systems.

The previous paradigm, in which a single computer served all of an organization's computing needs, has been replaced by a new system which accomplishes the job. Computer networks are the name given to such systems.

Computer networks have proven important to both businesses and people. The following are some of its primary applications:

Sharing of Information and Resources: Computer networks enable businesses with dispersed components to communicate information efficiently and effectively. Any computer's programs and software can be accessed by other computers connected to the network. With the help of this feature, we can also allow the user to share devices like printers and scanners.

Remote Information Retrieval: Users can access distant knowledge on various topics via computer networks. The data is kept in distant databases which the user can access via information systems such as the World Wide Web.

Quick Interpersonal Communication: Computer networks have expanded communication speed and volume like never before. Electronic mail (email) is widely used to transfer messages, documents, photos, and videos all over the world. Through social networking sites, online communication has risen by orders of magnitude.

E-commerce: Computer networks have cleared the way for a wide range of business and commercial activities to be conducted online, sometimes known as e-commerce. Users and companies can use the system to pool funds, purchase and sell things, pay bills, manage bank accounts, pay taxes, transfer cash, and manage investments.

Extremely Dependable Systems: Computer networks enable systems to be dispersed in nature, allowing data to be stored in different locations. As a result, the system is extremely dependable. If one of the sources fails, the system will continue to work, and data from the remaining sources will be available.

Inexpensive systems: Computer networks have lowered the cost of installing computer systems in businesses. Previously, corporations were required to establish highly costly mainframes for calculation and storage. With the introduction of networks, setting up networked personal computers (PCs) for the same function is adequate.

VoIP: Voice over Internet Protocol, has completely transformed telecommunications networks. Nowadays, telephone calls are also made using the internet protocol; the traditional system is not in use.

Money Saving:-  Computer Network saves money in the various businesses.

  • Organizations can employ independent personal computers for each user instead of pricey mainframe computers.
  • Organizations can employ the work-group paradigm (peer-to-peer), in which all PCs are networked together, and each has access to the others for communication or sharing.
  • If the firm requires security for its operations, it can use the domain model, which includes a server and clients. The server allows all clients to communicate and access data.
  • The entire setup is known as the client-server model.

Simultaneous access: A computer network enables a small number of people to develop programs and data at the same time. For example, a company's quarterly sales document requires many managers to examine and amend. We can save the data within the network server, Which is a central computer with a big storage device and other resources available to all users.

When any server stores files for the user to access, that time file server is commonly used. As shown in the image, We may save a unique copy of a data file on the server for each employee. Furthermore, if one user modifies the file, other users will notice a difference when utilizing it.

Uses of Computer Network

High Reliability as a Result of Multiple Record Sources:- The fundamental advantage of networks is their dependability, which is why they are becoming increasingly popular among businesses. Critical data may be preserved in several locations utilizing systems. In any case of a computer breaking or if the computer crashes, the data can be saved in another computer by the network. By this method, the data in any network can be protected.

Provide a Mode of Communication: A computer network provides a dynamic communication medium for geographically separated persons. It is simple for two or more people living in different locations to collaborate on the same project by splitting it via a network.

Remote Information Access:

Remote information may be accessed in a variety of ways.

As an example,

  • Home shopping, telephone bill payment, e-banking, internet stock trading, and so on.
  • It is possible to gain access to an information system such as the World Wide Web, which contains information on the craft, business, cookery, government, health, history, recreation, science, and sports, among other things.
  • The newspaper is now available online. You may get the news based on your interests.

Person-to-person communication:

Email:

  • The sender creates and sends an email message.
  • After sending the mail, the server saves the message in it.
  • The server notifies the receiver that a message has arrived.
  • When the receiver is ready to view the message, then he/she retrieves it from the server.

Video conferencing and Teleconferencing:

A teleconference is a virtual conference in which participants from many locations hold talks by typing messages. Each communication in the teleconference is visible to every one other.

Clients that have the necessary technology and software may watch and chat with each other face-to-face online rather than simply typing messages. This is referred to as videoconferencing.

Top business applications of computer networks in several fields:-

Software sharing:

In a computer network, application software is often placed on a centralized computer (Server Computer). Instead of purchasing a separate copy of the program for each user, the software may be shared over the network.

Hardware sharing:

Hardware devices in a computer network include printers, access points, HDD, SATA, SSD, drivers, and so on. Many people, for example, can share a single network-connected printer.

Uses of Computer Network

By sharing many devices in a single network, we can save money. With the network, the devices can be organized individually for each user, which is quite expensive for an enterprise.

Internet sharing:

Many users on a computer network can access the internet over a single connection and utilize various services.

Centralized Software Management:

All software are already installed and updated on any computer which has a single server. This saves time while installing/updating individual network computers. These software products are available to network users.

Data Security and Management:

In the computer network, the data is stored in center format. It means that all data is kept on a single server. An administrator improves the management of the company's vital data in a business setting.

Uses of Computer Network

By this, the data is very easily available to anyone. A system administrator has complete control and can view or modify crucial data. A system administrator can quickly create a backup of data. Similarly, security measures may be added to data.

Saving disk space:

Computer Network Applications are quite important. All machines on a computer network utilize the same copy of the data files. These are only saved on the server computer's hard drives.

There is no need to save the data files and run any application on a different computer if you are working on the network. This conserves disk space on each PC.

Performance Enhancement:

Using distributed computing, a network may be leveraged to increase the performance of many applications. A calculation task is divided across several machines on the network in distributed computing. This improves the performance of any program.

Entertainment:

People may find a variety of forms of amusement on the computer network. There are many activities that are performed under computer network activities like playing games, watching movies or shows, and listening to music. We can also meet new people on the internet.

Remote access:

A network also makes it possible to access data remotely. By this, the user can access, store or handle their data anywhere in the world.

Uses of Computer Network

Network packet:

The majority of current computer networks employ packet-mode communication methods. The network packet is the data unit, which can be transmitted via the packed switched network.

Packets include two sorts of data: control data and user data (payload). The control data provides information that the network needs in order to transfer data to the user, such as source and destination network addresses, error detection codes, and sequencing information. Packet headers and trailers frequently carry control information with payload data.

The bandwidth of the transmission channel can be better among users with network packets than the circuit-switched networks.