Ans. A computer network is a system of linked devices and computers that can exchange data and operate together. Networks can range from small Local Area Networks (LANs) to large Wide Area Networks (WANs), including the Internet.
Ans. The primary components of a computer network are: Nodes, Links, Switches, and Routers.
Ans. Nodes are devices that are connected to the network, such as computers, smartphones, and printers. They play an important role in many areas of computer science, including data structures, computer networks, neural networks, and blockchain systems.
Ans. Switches are devices that connect multiple nodes within a network to forward data. They serve as central devices that receive data packets from linked devices and intelligently transfer them to their intended destination, improving network efficiency and minimizing traffic congestion.
Ans. The primary objectives of computer networks are to enable resource sharing, data communication, connectivity, and collaboration.
Ans. A protocol is a formal agreement between two parties. A network protocol is a formal arrangement between two computers to send and receive information.
Ans. Transmission Media is the channel or path through which data or information is transferred from one place to another in a computer network. Examples include coaxial cable, fiber optic cable, and microwaves.
Ans. A router is a networking device that interconnects networks or allows devices to connect to it. It directs data packets between different networks, acting like a traffic director on the internet to ensure data gets from one place to another efficiently.
Ans. SIM stands for Subscriber Identity Module. It is a small card inserted into a mobile device that contains unique information to identify and authenticate the subscriber on a mobile network.
Ans. An access point works by receiving data from the wired network and transmitting it wirelessly to your devices. It also receives data from your wireless devices and sends it to the wired network.
Ans. Network topology is a geometric representation of the relationship among interconnected devices. The four main types are: Bus topology, Ring topology, Star topology, and Mesh topology.
Ans. There are three primary data transmission modes: Simplex, Half-Duplex, and Full-Duplex.
Ans. The Open Systems Interconnection (OSI) Model is a framework used to understand how different networking protocols interact. It has 7 layers, each with a specific function.
Ans. The 7 layers of the OSI model are: Physical Layer, Data Link Layer, Network Layer, Transport Layer, Session Layer, Presentation Layer, and Application Layer.
Ans. IP stands for Internet Protocol. It is a method of identifying each computer on the internet. All IP addresses are unique, and each device gets its own unique IP address when connected to the Internet.
Ans. Firewalls are security systems that monitor and control incoming and outgoing network traffic based on predetermined security rules. They act as barriers between trusted internal networks and untrusted external networks, functioning like security checkpoints.
Ans. Encryption transforms data into a secure format that can only be read by authorized parties with the correct decryption key. Decryption is the process of converting the encrypted data back to its original form.
Ans. Malware refers to malicious software such as viruses, worms, and ransomware that can damage or steal data. Phishing involves attempts to trick users into revealing sensitive information through deceptive emails or websites.
Ans. PAN is a small network used for communication between personal devices, such as smartphones, tablets, and laptops, within a short range. Example: Bluetooth connection between a smartphone and a headset forms a PAN.
Ans. CAN is a network that connects multiple LANs within a limited geographical area, such as a university campus or a business park.
Ans. The network that connects various departments and buildings within a university is a CAN.
Ans. Networks are connected together to make a larger network which is called network of networks or internet.
Ans. In bus topology, a computer sends a message on the bus. The computer to whom the message is sent receives it while others ignore it. At each end of the bus, a device called terminator is attached to prevent signals from bouncing back and causing errors.
Ans. In bus topology, all devices of the network are connected to a common transmission medium which has exactly two endpoints called terminators.
Ans. In bus topology, all devices are connected through a single common cable having exactly two endpoints. This cable is called the backbone of the topology.
Ans. In ring topology, a ring can be unidirectional or bidirectional. Unidirectional: Data is sent either clockwise or anti-clockwise. Bidirectional: Data can travel in any direction. Upon receiving data, a computer may pass data to its next neighbor.
Ans. Advantages: Star topology is more reliable and supports larger numbers of computers than bus topology. It is easier to detect and fix errors than bus topology. Disadvantages: More cable length is required compared to bus topology. Star topology is more expensive than bus topology.
Ans. In ring topology, a failure of connection between two computers may bring down the whole network.
Ans. Data communication refers to the exchange of messages between sending and receiving devices through some communication medium. The main components are: Sender, Receiver, Message, Protocol, and Transmission Medium.
Ans. Sender: A device that initiates the communication process by sending messages consisting of text, numbers, pictures, etc. It is also called transmitter. Receiver: A device that receives messages. It is also called sink. The receiver can be a computer, printer, or another device.
Ans. Message: The data or information to be communicated, which may consist of text, numbers, pictures, sound, video, or any combination of these. Packet: In networking, a packet is a small unit of data transferred across a network. It includes Payload (actual content) and Control Information (address of sender and receiver).
Ans. The Transport Layer ensures that data is transferred from one process running on a source end system to a process running on a destination end system. It manages data flow control and error checking.
Ans. Data Link Layer: Handles error detection and correction, as well as node-to-node data transport. It ensures error-free data transmission from the physical layer. Physical Layer: Deals with the physical medium used in communication, such as cabling.
Ans. IPv4 address is a 32-bit number that uniquely identifies a network interface on a machine. IPv4 addresses are divided into four groups separated by dots. Example: 172.16.254.1
Ans. IPv6 address is a 128-bit number that uniquely identifies a network interface on a machine. In IPv6, there are 8 groups separated by colons.
Ans. The Network Layer is responsible for data transfer between different networks. It determines the best path for data to travel from the source to the destination. Example: Similar to a GPS system finding the best route for travel from home to school.
Ans. Packet switching is a technique of data transmission where data is divided into individual packets that are delivered independently over the network, sometimes via various routes, and then reassembled at the destination. It is used for internet, email, and VoIP (Voice over Internet Protocol).
Ans. DHCP automatically assigns IP addresses to devices on a network, simplifying network management. Example: When a device connects to a Wi-Fi network, DHCP assigns it an IP address.
Ans. Encapsulation hides the actual content of the message (called payload) inside headers at each layer, which helps ensure secure communication in a network.
Ans. Transmission Control Protocol (TCP): Ensures reliable data transfer with error checking and retransmission. User Datagram Protocol (UDP): Provides faster but less reliable data transfer without guarantees of delivery.