0% found this document useful (0 votes)
27 views

Computer Networks

A computer network allows devices to share resources and exchange information. It connects computers and other devices using hardware and software that enable communication. This allows sharing of files, data storage, printers and collaboration between users. Common network types include local area networks within an office or building and wide area networks that span large geographic areas. Network devices like routers, switches and wireless access points help facilitate communication between connected devices using standard network protocols.

Uploaded by

skartikeyyy222
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views

Computer Networks

A computer network allows devices to share resources and exchange information. It connects computers and other devices using hardware and software that enable communication. This allows sharing of files, data storage, printers and collaboration between users. Common network types include local area networks within an office or building and wide area networks that span large geographic areas. Network devices like routers, switches and wireless access points help facilitate communication between connected devices using standard network protocols.

Uploaded by

skartikeyyy222
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 17

COMPUTER NETWORKS

A computer network is a collection of


interconnected autonomous computing devices
so as to exchange information or share resources.

By : Sachin Kumar Mishra


&
Kartikeya Sambare
Importance of Computer Network
Computer networking refers to the practice of
connecting computers and other digital devices
together to share resources and exchange
information. It involves the use of hardware and
software technologies that enable
communication between computers and other
devices, whether they are located in the same
physical location or are geographically
dispersed.
A computer network allows for the sharing of
resources such as printers, files, and data
storage, as well as the ability to communicate
with other computers and access the internet.
Networking also enables collaboration between
individuals and groups, and supports the
transfer of data and information across a variety
of platforms and devices.
Types of Computer Network
• Based on Communication medium: • Based on Computer Network
 Wired Network: As we all know, “wired” Architecture:
refers to any physical medium made up of Client-Server Architecture: Client Server
cables. Copper wire, twisted pair, or fiber optic
cables are all options. A wired network Architecture is basically the architecture
employs wires to link devices to the Internet or where the clients and the server are
another network, such as laptops or desktop connected as two clients can
PCs. communicate with each other and the
Wireless Network: “Wireless” means without devices present work as servers in the
wire, media that is made up of network.
electromagnetic waves (EM Waves) or infrared  Peer-to-Peer Architecture: Peer-to-Peer
waves. Antennas or sensors will be present on
all wireless devices. Cellular phones, wireless
Architecture, computers are connected
sensors, TV remotes, satellite dish receivers, to each other and each computer is
and laptops with WLAN cards are all examples equally capable of working as there is no
of wireless devices. For data or voice central server here. Each device present
communication, a wireless network uses radio here can be used as a client or server.
frequency waves rather than wires.
Types of Computer Networks(Geographical Spread)
 Local Area Network (LAN) – Wide Area Network(WAN) –
Small area networks that are confined to a The network spread across countries or an
localized area (e.g. an office, a building or a very big geographical are known as WAN’S.
factory)are known as LAN’s. The key purpose A WAN is a group of LAN’s that are
of LAN is to serve in resource sharing. The separated by large distances and tied
hardware as well as software resources are together. The WAN’s link computers to
shared through LAN’s. For instance LAN users facilitate fast and efficient exchange of
can share data, information, programs, information at lesser costs and higher
printers, hard-disks, modems, etc. speeds.
 Metropolitan Area Network (MAN) – Personal Area Network (PAN) –
Metropolitan area Network covers a larger PAN is a personal area network having an
area than that covered by a LAN and a interconnection of personal technology
smaller area as compared to WAN. MAN devices to communicate over a short
has a range of 5-50km. It connects two or distance. It covers only less than 10 meters
more computers that are apart but reside in or 33 feet of area. PAN has fewer users as
the same or different cities. It covers a large compared to other networks such as LAN,
geographical area and may serve as an ISP WAN, etc. PAN typically uses some form of
(Internet Service Provider). MAN is wireless technology. PAN involves the
designed for customers who need high- transmission of data between information
speed connectivity. Speeds of MAN range in devices such as smartphones, personal
terms of Mbps. It’s hard to design and computers, tablet computers, etc.
maintain a Metropolitan Area Network.
Network Topologies
 The Star Topology – Bus or Linear Topology –
This topology consists of a central node to This topology consists of a single length of
which all other nodes are connected by a a transmission medium onto which the
single path. It is a topology used in most various nodes are attached. The topology
existing information networks involving is used in traditional data communication
data processing or voice communications. network where the host at one end of the
The most common example of this is IBM bus communicates with several terminals
370 installations. In this case multiple attached along its length.
3270 terminals are connected to either a
host system or a terminal controller.
The Ring or circular Topology – The Tree Topology –
In this case, each node is connected to two Tree topology is a variation of the bus
and only two neighbor nodes. Data is topology. The shape of the network is that
accepted from one of neighbor nodes and is of an inverted tree with the central root
transmitted onwards to another. Thus data branching and sub-branching to the
travels in one direction only, from node to extremities of the network. Tree topology is
node around the ring. After passing through best suited for applications which have a
each node, it returns to the sending node, hierarchical flow of data and control. Since
which removes it. the tree topology is a ‘pure’ network
topology it is known as a hybrid topology.
 Mesh Topology – Fully Connected –
In this topology, each node is connected to When a network host is connected directly
more than one node to provide an i.e., there is a direct link between each
alternative route in the case the host is host, then the network is said to be fully
either down or too busy. The mesh connected. This characteristic is termed as
topology is excellent for too long distance full connectivity.
networking because it provides extensive
back-up, rerouting and pass through
capabilities. Communication is possible
between any two nodes on the network
wither directly or by passing through.
Networking Devices
 Modem-  Network Interface Card (NIC) –
Modem allows you to combine the power of The NIC is a device that is attached to each
your computer with the global reach of the of the workstations and the server, and
telephone system. Modem is a device which helps the workstation establish all the
allows a computer to send and receive data important connection with the network.
over telephone lines or cable connection. Each NIC that is attached to a workstation
Since ordinary telephone lines cannot carry has a unique number identifying it, which is
digital information, a modem changes the known as node address. The NIC is also
digital data from your computer into analog called Terminal Access Point (TAP).
data.
Router – Wifi Card –
A router is a networking device that A wifi card is either an internal or external
forwards data from one network to another. Local Area Network adapter with a built-in
A router works like a bridge but can handle wireless radio and antenna. The most
different protocols. A router use physical common wifi cards used are PCI-Express.
address (Media-Access-Control address)to The primary benefit of using a wifi card in a
forward data. desktop computer is that it allows you to
setup your workstation or home office
without considering the proximity or
availability of hard line network address.
Network protocols

A network protocol is an established Similar to the way that speaking the


set of rules that determine how data is same language simplifies
transmitted between different devices communication between two
in the same network. Essentially, it people, network protocols make it
allows connected devices to possible for devices to interact with
communicate with each other, each other because of
regardless of any differences in their predetermined rules built into
internal processes, structure or devices’ software and hardware.
design. Network protocols are the Neither local area networks (LAN)
reason you can easily communicate nor wide area networks (WAN) could
with people all over the world, and function the way they do today
thus play a critical role in modern without the use of network
digital communications. protocols.
S
M Simple Mail Transfer Protocol
T
P
FT File Transfer Protocol
P

T
C
Transmission Control Protocol
P
H
T Hypertext transfer protocol secure
TP
S
Simple Mail Transfer Protocol
 SMTP is a set of communication guidelines that allow software to transmit an electronic
mail over the internet is called Simple Mail Transfer Protocol.
 It is a program used for sending messages to other computer users based on e-mail
addresses.
 It provides a mail exchange between users on the same or different computers, and it
also supports:
 It can send a single message to one or more recipients.
 Sending message can include text, voice, video or graphics.
 It can also send the messages on networks outside the internet.
 The main purpose of SMTP is used to set up communication rules between servers. The
servers have a way of identifying themselves and announcing what kind of
communication they are trying to perform. They also have a way of handling the errors
such as incorrect email address. For example, if the recipient address is wrong, then
receiving server reply with an error message of some kind.
File Transfer Protocol

FTP, or File Transfer Protocol, is a way to send and receive


files between computers over the internet. It's like a digital
courier service that helps you share documents, images, or any
type of file with others. When you use FTP, you connect your
computer to a server, and then you can upload files to that
server or download files from it. It's a simple and widely used
method for moving files around, especially in situations like
updating a website or sharing files between computers.
Transmission Control Protocol

TCP, or Transmission Control Protocol, is a fundamental


communication protocol on the internet. It ensures reliable
and ordered delivery of data between devices. Acting like a
virtual conversation, TCP breaks data into packets, numbers
them, and manages their transmission. It's vital for
applications like file transfers and web browsing, providing
a dependable method for accurate data exchange in network
communication.
Hypertext transfer protocol secure
Hypertext transfer protocol secure (HTTPS) is the secure version
of HTTP which is the primary protocol used to send data between
a web browser and a website. HTTPS is encrypted in order to
increase security of data transfer. This is particularly important
when users transmit sensitive data, such as by logging into a bank
account, email service, or health insurance provider.
Any website, especially those that require login credentials, should
use HTTPS. In modern web browsers such as Chrome, websites
that do not use HTTPS are marked differently than those that are.
Look for a padlock in the URL bar to signify the webpage is
secure. Web browsers take HTTPS seriously

You might also like