• Random article
  • Teaching guide
  • Privacy & cookies

NASA PC cluster network from c.1996.

Computer networks

by Chris Woodford . Last updated: April 6, 2023.

T hank goodness for computer networks! If they'd never been invented, you wouldn't be reading this now (using the Internet ) and I wouldn't be writing it either (using a wireless home network to link up my computer equipment). There's no doubt that computer networking is extremely complex when you delve into it deeply, but the basic concept of linking up computers so they can talk to one another is pretty simple. Let's take a closer look at how it works!

Photo: Linking PCs together in a network makes it possible to solve complex problems in new ways. This, for example, is an early cluster (a simple kind of supercomputer , made from networked PCs), that was used at NASA in the mid-1990s. Google's original data centers were also, famously, built from off-the-shelf clustered PCs like these. Photo courtesy of NASA Lewis Research Center and Internet Archive .

What is a computer network?

You can do lots of things with a computer but, connect it up to other computers and peripherals (the general name given to add-on bits of computer equipment such as modems , inkjet and laser printers , and scanners) and you can do an awful lot more. [1] A computer network is simply a collection of computer equipment that's connected with wires, optical fibers , or wireless links so the various separate devices (known as nodes ) can "talk" to one another and swap data (computerized information).

Artwork illustrating basic concept of a network linking multicolored computers.

Artwork: The basic concept of a computer network: a collection of computers (and related equipment) hooked up with wired or wireless links so any machine can exchange information with any other.

Types of networks

Not all computer networks are the same. The network I'm using to link this laptop to my wireless router, printer, and other equipment is the smallest imaginable. It's an example of what's sometimes called a PAN (personal area network) —essentially a convenient, one-person network. If you work in an office, you probably use a LAN (local area network) , which is typically a few separate computers linked to one or two printers, a scanner, and maybe a single, shared connection to the Internet. Networks can be much bigger than this. At the opposite end of the scale, we talk about MANs (metropolitan area networks) , which cover a whole town or city, and WANs (wide area networks) , which can cover any geographical area. The Internet is a WAN that covers the entire world but, in practice, it's a network of networks as well as individual computers: many of the machines linked to the Net connect up through LANs operated by schools and businesses.

Computers are all about logic—and logic is all about following rules. Computer networks are a bit like the army: everything in a network has to be arranged with almost military precision and it has to behave according to very clearly defined rules. In a LAN, for example, you can't connect things together any old how: all the nodes (computers and other devices) in the network have to be connected in an orderly pattern known as the network topology . You can connect nodes in a simple line (also called a daisy chain or bus), with each connected to the next in line. You can connect them in a star shape with the various machines radiating out from a central controller known as the network server. Or you can link them into a loop (generally known as a ring). Other topologies include meshes (where each machine is directly connected to some of the others or all of them—which is called a full mesh) and trees (where small star networks are connected together in a line or bus). All the devices on a network also have to follow clearly defined rules (called protocols ) when they communicate to ensure they understand one another—for example, so they don't all try to send messages at exactly the same time, which causes confusion.

Artwork: The best-known computer network topologies: line (chain/bus), ring, star, mesh (where each node is connected to some of the others), full mesh (each node is connected to all the others), and tree (star networks connected in a line).

Permissions and security

Just because a machine is on a network, it doesn't automatically follow that every other machine and device has access to it (or can be accessed by it). The Internet is an obvious example. If you're online, you get access to billions of Web pages, which are simply files stored on other machines (servers) dotted all over the network. But you can't access every single file on every single computer hooked up to the Internet: you can't read my personal files and I can't read yours, unless we specifically choose for that to happen.

Artwork: Permissions: When you upload files to a web server, you have to decide what permissions to set: whether you, and other users, can read the file (read permission), change it (write permission), or run it (execute permission). That's why you can't automatically access every file on every web server and why you'll sometimes see a "Forbidden" error if you try to do so.

Permissions and security are central to the idea of networking: you can access files and share resources only if someone gives you permission to do so. Most personal computers that connect to the Internet allow outgoing connections (so you can, theoretically, link to any other computer), but block most incoming connections or prohibit them completely. Servers (the machines on the Internet that hold and serve up Web pages and other files) operate a more relaxed policy to incoming connections. You've probably heard of hacking , which, in one sense of the word, means gaining unauthorized access to a computer network by cracking passwords or defeating other security checks. To make a network more secure, you can add a firewall (either a physical device or a piece of software running on your machine, or both) at the point where your network joints onto another network or the Internet to monitor and prohibit any unauthorized, incoming access attempts.

What makes a network?

To make a network, you need nodes and connections (sometimes called links) between them. Linking up the nodes means making some sort of a temporary or permanent connection between them. In the last decade or so, wireless connections have become one of the most popular ways of doing this, especially in homes. In offices, wired connections are still more commonplace—not least because they are generally faster and more secure and because many newer offices have network cabling already in place.

Apart from computers, peripherals, and the connections between them, what else do you need? Each node on a network needs a special circuit known as a network card (or, more formally, a network interface card or NIC) to tell it how to interact with the network. Most new computers have network cards built in as standard. If you have an older computer or laptop, you may have to fit a separate plug-in circuit board (or, in a laptop, add a PCMCIA card) to make your machine talk to a network. Each network card has its own separate numeric identifier, known as a MAC (media access control) code or LAN MAC address. A MAC code is a bit like a phone number: any machine on the network can communicate with another one by sending a message quoting its MAC code. In a similar way, MAC codes can be used to control which machines on a network can access files and other shared resources. For example, I've set up my wireless link to the Internet so that only two MAC codes can ever gain access to it (restricting access to the network cards built into my two computers). That helps to stop other people in nearby buildings (or in the street) hacking into my connection or using it by mistake.

Photo: A typical wireless network card with its outer case removed so you can see what's inside. It consists of a pair of chips plus a radio transmitter/receiver antenna. The antenna sends data to (and receives data from) a wireless (Wi-Fi) network. The smaller chip manages that process and passes its data to the larger chip, which is called an Ethernet MAC/BBP (baseband processor). This converts the incoming data into a form your computer can understand—and turns outgoing data from your computer into a form the wireless antenna can ping out to nearby devices.

The bigger you make a network, the more extra parts you need to add to make it function efficiently. Signals can travel only so far down cables or over wireless links so, if you want to make a big network, you have to add in devices called repeaters —effectively signal boosters. You might also need bridges , switches , and routers —devices that help to link together networks (or the parts of networks, which are known as segments), regulate the traffic between them, and forward traffic from one part of a network to another part.

Photo: A wireless router like this one, made by Netgear, is the heart of many home PANs.

Understanding computer networks with layers

The osi model, the tcp/ip (darpa) model, networks on the fly, how ethernet works.

Not so long ago, computers were all made by different companies, worked in different ways, and couldn't communicate with one another. Often, they didn't even have the same sorts of plugs and sockets on their cases! During the 1980s and 1990s, everything became much more standardized and it's now possible to connect virtually any machine to any other and get them exchanging data without too much effort. That's largely because most networks now use the same system, called Ethernet . It was developed in May 1973 by US computer engineer Dr Robert ("Bob") Metcalfe (1946–), who went on to found 3Com and later became a well-known computer-industry pundit (perhaps, somewhat unfairly, best known for predicting, in 1995, a spectacular collapse of the Internet that never actually occurred).

Photo: A typical ethernet networking cable.

As Metcalfe originally designed it, Ethernet was based on three very simple ideas. First, computers would connect through the "ether" (a semi-serious, semi-scientific name for the void of emptiness that separates them) using standard coaxial cable (wires like the ones used in a television antenna connection, made up of concentric metal layers). In Ethernet-speak, the physical connection between the nodes (computers and other devices) on the network is also known as the medium . Things have moved on quite a bit since the early 1970s and the medium is now just as often a wireless radio link (you've probably heard of Wi-Fi , which is the wireless version of Ethernet). Second, all the computers and devices on a network would stay silent except for when they were sending or receiving messages. Finally, when they wanted to communicate, they'd do so by breaking up messages into small packets of data and sending them around the network by a highly efficient method known as packet switching (discussed in much more detail in our article on the Internet ).

What's in a frame?

Artwork: The main contents of an Ethernet frame are the preamble (initial "handshaking" information to let the sender and receiver synchronize), the receiver's and sender's MAC addresses, the type and length of data, the data itself, and a checksum (error correction data) at the end to make sure everything has been transmitted properly.

Find out more

  • An interview with Bob Metcalfe : Manek Dubash offers this fascinating interview with the Ethernet pioneer to mark 40 years of his world-changing invention.
  • Oral history of Bob Metcalfe : A much longer (almost three-hour) oral history interview with Len Shustek of The Computer History Museum.

How do computer networks detect errors?

Artwork: Checking the integrity of a large download with an MD5 code: If you've ever downloaded a Linux distribution (anything from a few hundred megabytes to several gigabytes of data), you've probably done this—or you certainly should have done! On the original download page, you'll be given an MD5 checksum code matching the file you want to download. Once your download is complete, you simply run the file through an MD5 calculator (easy in Linux, and here I'm doing it on Windows using winMd5sum) to calculate the MD5 code from the data you've downloaded. If the two MD5 codes match, you can be reasonably confident your file downloaded without any mistakes.

If you liked this article...

On this website.

  • History of communication
  • History of computers
  • Wireless Internet and Wi-Fi

For older readers

  • Networking All-in-One For Dummies (7th Edition) by Doug Lowe. For Dummies, 2018. Covers topics such as how to build and secure a network, wireless and mobile devices, and everyday administration.
  • Computer Networking: A Top-Down Approach by James F. Kurose and Keith W. Ross. Pearson Education, 2017. A comprehensive guide to networking written in a clear, engaging way with plenty of meaningful examples.
  • Computer Networks by Andrew S. Tanenbaum and David J. Wetherall. Pearson, 2013. One of the best-known and most popular textbooks on networking, now in its fifth edition.

For younger readers

  • Computer Networks by Clive Gifford. Wayland, 2015. An illustrated 32-page introduction for ages 8–10, focusing mainly on the Internet and the Web.
  • Understanding Computer Networks by Matthew Anniss. Raintree/Capstone, 2015. A 48-page introduction for ages 9–12. Again, the focus is mainly on the Internet.
  • Personal Virtual Networks Could Give Everyone More Control Over Their Data by Fahmida Y Rashid. IEEE Spectrum, February 14, 2020. Can network users be completely mobile and completely secure? Personal virtual networks (PVN) aim to give us the best of both worlds.
  • How Internet Giants Upended the Networking-Hardware Business by Cade Metz. Wired, February 19, 2015. Facebook, Google, and Amazon have radically reinvented the hardware that connects the Internet together.
  • OSI: The Internet That Wasn't by Andrew L. Russell. IEEE Spectrum, July 30, 2013. How eminently practical TCP/IP eclipsed the more conceptual, committee-driven OSI approach to networking.
  • Metcalfe's Law is Wrong by Bob Briscoe, Andrew Odlyzko and Benjamin Tilly. IEEE Spectrum, July 1, 2006. Does "more users = better" always apply?
  • Building Networks on the Fly by Robert Pascoe. IEEE Spectrum, March 1, 2001. How networking technologies like Bluetooth create improvised networks.

References ↑    This is a simple statement of what's sometimes called Metcalfe's Law , named for Ethernet-inventor Bob Metcalfe. ↑    This was originally published as ISO 7498:1984 , which has now been replaced by ISO/IEC 7498-1:1994 . ↑    The story is described in A Thread Across the Ocean The Heroic Story of the Transatlantic Cable by John Steele Gordon, HarperCollins, 2003 and The Cable The Wire That Changed the World by Gillian Cookson, The History Press, 2012. Please do NOT copy our articles onto blogs and other websites Articles from this website are registered at the US Copyright Office. Copying or otherwise using registered works without permission, removing this or other copyright notices, and/or infringing related rights could make you liable to severe civil or criminal penalties. Text copyright © Chris Woodford 2008, 2023. All rights reserved. Full copyright notice and terms of use . Follow us

Rate this page, tell your friends, cite this page, more to explore on our website....

  • Get the book
  • Send feedback

Logo for The Pennsylvania State University

Want to create or adapt books like this? Learn more about how Pressbooks supports open publishing practices.

Chapter 2: Hardware, Software, and Networking

9 Computer Networks

https://en.wikipedia.org/wiki/Computer_network

A computer network or  data network is a  telecommunications network which allows  computers to exchange data . In computer networks, networked computing devices exchange data with each other using a data link . The connections between nodes are established using either cable media or  wireless media . The best-known computer network is the Internet .

Network computer devices that originate, route and terminate the data are called network nodes . [1] Nodes can include hosts  such as personal computers , phones , servers as well as  networking hardware . Two such devices can be said to be networked together when one device is able to exchange information with the other device, whether or not they have a direct connection to each other.

Computer networks differ in the transmission medium  used to carry their signals, the communications protocols to organize network traffic, the network’s size, topology  and organizational intent.

Computer networks support an enormous number of applications and services such as access to the World Wide Web , digital video , digital audio , shared use of application and storage servers , printers , and fax machines , and use of email and instant messaging applications as well as many others. In most cases, application-specific communications protocols are layered (i.e. carried as  payload ) over other more general communications protocols.

Computer networking may be considered a branch of electrical engineering , telecommunications , computer science , information technology or computer engineering , since it relies upon the theoretical and practical application of the related disciplines.

A computer network facilitates interpersonal communications allowing users to communicate efficiently and easily via various means: email, instant messaging, chat rooms, telephone, video telephone calls, and video conferencing. Providing access to information on shared storage devices is an important feature of many networks. A network allows sharing of files, data, and other types of information giving authorized users the ability to access information stored on other computers on the network. A network allows sharing of network and computing resources. Users may access and use resources provided by devices on the network, such as printing a document on a shared network printer. Distributed computing uses computing resources across a network to accomplish tasks. A computer network may be used by computer crackers to deploy computer viruses or computer worms on devices connected to the network, or to prevent these devices from accessing the network via a denial of service attack.

Network packet

Computer communication links that do not support packets, such as traditional point-to-point telecommunication links , simply transmit data as a bit stream . However, most information in computer networks is carried in packets . A network packet is a formatted unit of data (a list of bits or bytes, usually a few tens of bytes to a few kilobytes long) carried by a  packet-switched network .

In packet networks, the data is formatted into packets that are sent through the network to their destination. Once the packets arrive they are reassembled into their original message. With packets, the bandwidth of the transmission medium can be better shared among users than if the network were circuit switched . When one user is not sending packets, the link can be filled with packets from others users, and so the cost can be shared, with relatively little interference, provided the link isn’t overused.

Packets consist of two kinds of data: control information, and user data (payload). The control information provides data the network needs to deliver the user data, for example: source and destination network addresses , error detection codes, and sequencing information. Typically, control information is found in packet headers and trailers , with payload data in between.

Often the route a packet needs to take through a network is not immediately available. In that case the packet is queued and waits until a link is free.

Network nodes

Apart from any physical transmission medium there may be, networks comprise additional basic system building blocks, such as network interface controller (NICs), repeaters , hubs , bridges , switches , routers ,  modems , and firewalls .

Types of Networks

Nanoscale network – A nanoscale communication network has key components implemented at the nanoscale including message carriers and leverages physical principles that differ from macroscale communication mechanisms. Nanoscale communication extends communication to very small sensors and actuators such as those found in biological systems and also tends to operate in environments that would be too harsh for classical communication. [16]

Personal area network – A personal area network (PAN) is a computer network used for communication among computer and different information technological devices close to one person. Some examples of devices that are used in a PAN are personal computers, printers, fax machines, telephones, PDAs, scanners, and even video game consoles. A PAN may include wired and wireless devices. The reach of a PAN typically extends to 10 meters. [17] A wired PAN is usually constructed with USB and FireWire connections while technologies such as Bluetooth and infrared communication typically form a wireless PAN.

Local area network – A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office building, or closely positioned group of buildings. Each computer or device on the network is a node . Wired LANs are most likely based on Ethernet technology. Newer standards such as ITU-T G.hn also provide a way to create a wired LAN using existing wiring, such as coaxial cables, telephone lines, and power lines. [18]

The defining characteristics of a LAN, in contrast to a wide area network (WAN), include higher data transfer rates , limited geographic range, and lack of reliance on leased lines to provide connectivity. Current Ethernet or other IEEE 802.3 LAN technologies operate at data transfer rates up to 100 Gbit/s , standarized by IEEE in 2010. [19] Currently, 400 Gbit/s Ethernet is being developed.

A LAN can be connected to a WAN using a router .

Home area network – A home area network (HAN) is a residential LAN used for communication between digital devices typically deployed in the home, usually a small number of personal computers and accessories, such as printers and mobile computing devices. An important function is the sharing of Internet access, often a broadband service through a cable TV or digital subscriber line (DSL) provider.

Storage area network – A storage area network (SAN) is a dedicated network that provides access to consolidated, block level data storage. SANs are primarily used to make storage devices, such as disk arrays, tape libraries, and optical jukeboxes, accessible to servers so that the devices appear like locally attached devices to the operating system. A SAN typically has its own network of storage devices that are generally not accessible through the local area network by other devices. The cost and complexity of SANs dropped in the early 2000s to levels allowing wider adoption across both enterprise and small to medium-sized business environments.

Campus area network – A campus area network (CAN) is made up of an interconnection of LANs within a limited geographical area. The networking equipment (switches, routers) and transmission media (optical fiber, copper plant, Cat5 cabling, etc.) are almost entirely owned by the campus tenant / owner (an enterprise, university, government, etc.).

For example, a university campus network is likely to link a variety of campus buildings to connect academic colleges or departments, the library, and student residence halls.

Backbone network – A backbone network is part of a computer network infrastructure that provides a path for the exchange of information between different LANs or sub-networks. A backbone can tie together diverse networks within the same building, across different buildings, or over a wide area.

For example, a large company might implement a backbone network to connect departments that are located around the world. The equipment that ties together the departmental networks constitutes the network backbone. When designing a network backbone, network performance  and network congestion are critical factors to take into account. Normally, the backbone network’s capacity is greater than that of the individual networks connected to it.

Another example of a backbone network is the Internet backbone , which is the set of wide area networks (WANs) and core routers that tie together all networks connected to the Internet .

Metropolitan area network – A Metropolitan area network (MAN) is a large computer network that usually spans a city or a large campus

Wide area network – A wide area network (WAN) is a computer network that covers a large geographic area such as a city, country, or spans even intercontinental distances. A WAN uses a communications channel that combines many types of media such as telephone lines, cables, and air waves. A WAN often makes use of transmission facilities provided by common carriers, such as telephone companies. WAN technologies generally function at the lower three layers of the OSI reference model : the physical layer , the data link layer , and the network layer .

Enterprise private network – An enterprise private network is a network that a single organization builds to interconnect its office locations (e.g., production sites, head offices, remote offices, shops) so they can share computer resources.

Virtual private network – A virtual private network (VPN) is an overlay network in which some of the links between nodes are carried by open connections or virtual circuits in some larger network (e.g., the Internet) instead of by physical wires. The data link layer protocols of the virtual network are said to be tunneled through the larger network when this is the case. One common application is secure communications through the public Internet, but a VPN need not have explicit security features, such as authentication or content encryption. VPNs, for example, can be used to separate the traffic of different user communities over an underlying network with strong security features.

VPN may have best-effort performance, or may have a defined service level agreement (SLA) between the VPN customer and the VPN service provider. Generally, a VPN has a topology more complex than point-to-point.

Global area network – A global area network (GAN) is a network used for supporting mobile across an arbitrary number of wireless LANs, satellite coverage areas, etc. The key challenge in mobile communications is handing off user communications from one local coverage area to the next. In IEEE Project 802, this involves a succession of terrestrial wireless LANs . [20]

An intranet is a set of networks that is under the control of a single administrative entity. The intranet uses the IP protocol and IP-based tools such as web browsers and file transfer applications. The administrative entity limits use of the intranet to its authorized users. Most commonly, an intranet is the internal LAN of an organization. A large intranet typically has at least one web server to provide users with organizational information. An intranet is also anything behind the router on a local area network.

An extranet is a network that is also under the administrative control of a single organization, but supports a limited connection to a specific external network. For example, an organization may provide access to some aspects of its intranet to share data with its business partners or customers. These other entities are not necessarily trusted from a security standpoint. Network connection to an extranet is often, but not always, implemented via WAN technology.

A darknet is an overlay network, typically running on the internet, that is only accessible through specialized software. A darknet is an anonymizing network where connections are made only between trusted peers — sometimes called “friends” ( F2F ) [21]  — using non-standard  protocols and ports .

Darknets are distinct from other distributed peer-to-peer networks as  sharing is anonymous (that is, IP addresses are not publicly shared), and therefore users can communicate with little fear of governmental or corporate interference. [22]

Information, People, and Technology Copyright © by by Wikipedia, with help from Bart Pursel is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License , except where otherwise noted.

Share This Book

If you're seeing this message, it means we're having trouble loading external resources on our website.

If you're behind a web filter, please make sure that the domains *.kastatic.org and *.kasandbox.org are unblocked.

To log in and use all the features of Khan Academy, please enable JavaScript in your browser.

Computers and the Internet

Course: computers and the internet   >   unit 3, computer networks.

  • Wires, cables, and WiFi
  • Physical network connections
  • Bit rate, bandwidth, and latency
  • Bit rate and bandwidth

Building a network

  • The ring topology looks like a circle of connected devices, where each device is connected to two neighbors (one on either side).
  • The mesh topology looks like a circle with lines inside it, showing that every device is connected to every other device.
  • The star topology has a device at the center and then a connection between that center device and the other five devices.
  • The bus topology shows a center line with connections coming off the line for each device. No device is directly connected to another device, but they are all connected via the central line.
  • The tree topology starts with a single device at the top which branches to connect with two more devices. The left child device branches to connect with two more devices, while the right child only has one branch connecting it to a child device. There are three layers to the tree.

Types of networks

  • (Choice A)   DCN A DCN
  • (Choice B)   WAN B WAN
  • (Choice C)   LAN C LAN

Networking protocols

Want to join the conversation.

  • Upvote Button navigates to signup page
  • Downvote Button navigates to signup page
  • Flag Button navigates to signup page

Great Answer

  • Computer Network Practice Problems

A computer network is a collection of various computing machines that are able to share each other’s resources in a mannerly fashion . Computer network is at the centre of all the modern processes and computational exercises. A computer network makes the world wide web possible. It is through a computer network that all the technological advances are made and the concept of forming and maintaining a computer network is basic to almost all modern professions. Here we have a section that has most interesting questions testing your knowledge about computer networks. Let us see more!

Browse more Topics under Networking

  • Computer Networks
  • The OSI Model
  • Computer and Network Security
  • Internet and the WWW
  • Security Tools, Virus, Hacking

Networking Practice Questions

Networking Practice Questions has questions based on the concepts of Computer Networks, The OSI Model , Computer and Network Security, Internet and the World Wide Web . Here we will see many previous years questions which will not only help you get a total recap of what you have learned but also let you understand the type of challenges and the level of difficulty that you must expect.

Q1: Hub is associated with ……. network.    [S B I Clerk 2011]

A) Bus             B) Ring                     C) Star                     D) Mesh                       E) All of the above

Q2: Multiplexing involves ……. path and …………….. channel.              [S B I Clerk, 2011]

A) one, one                B) one, multiple                   C) multiple, one                   D) multiple, multiple               E) None of the above

Q3: The advantage of L A N is   [S B I Clerk, 2012]

A) sharing peripherals                      B) backing up your data                  C) saving all your data                  D) accessing the web                E) automatic printing of data

Q4: Which type of network would use phone lines ?              [S B I Clerk 2012]

A) W A N                     B) L A N                              C) W W A N                      D) Wireless                    E) None of the above

Q5: Servers are those computers which provide resources to other computers connected by:    [S B I Clerk 2009]

A) network                  B) backup system                        C) server                D) peripheral                     E) modem

Q6: A combination of hardware and software that allows communication and electronic transfer of information between computers is a:               [S B I Clerk 2012]

A) network                   B) backup system                     C) server               D) peripheral                E) modem

Q7: What type of resource is most likely to be a shared common resource in a computer network?         [Allahbad Bank Clerk, 2010]

A) Printers                   B) Speakers               C) Floppy Disk Drives                         D) Keyboards                    E) None of the above

Q8: A device that connects to a network without the use of cables is said to be:     [I B P S Clerk, 2012]

A) distributed             B) cabled                  C) centralized D) open source                  E) wireless

computer network

Find Your Answers Here

Q1: C), Q2: B), Q3: A), Q4: A), Q5: A), Q6: A), Q7: A), Q8: E)

Q1: ……… is the most important/ powerful computer in a typical network.       [S B I P. O. 2013]

A)   Network station                B) Network Client                  C)  Desktop                  D)Network server                     E) Network switch

Q2: P2P is a …….. application architecture.      [I B P S Clerk 2012]

A) client/ server                  B) distributed                  C) centralised                        D) 1 – tier               E) None of the above

Q3: Which of the following represents the fastest data transmission speed?         [S B I Clerk, 2012]

A) Bandwidth                      B) bps                C) gbps                      D) kbps                  E) mbps

Q4: In O S I network architecture, the routing is performed by:          [I B P S Clerk 2012]

A) network layer                         B) data link layer                      C) transport layer                  D) session layer                     E) None of the above

Q5: Which of the following is considered a broadband communication channel?     [S B I P. O. 2010]

A) Coaxial cable                B) Fiber optics cable          C) Microwave circuits            D) All of these            E) None of the above

Q6: How many bits are there in the ethernet address?               [S B I clerk 2011]

A) 64 bits                     B) 48 bits                   C) 32 bits                  D) 16 bits                  E) None of these

Q7: How many layers are in the T C P/ I P model?     [S B I Clerk 2011]

A) 4 layers                B) 5 layers                       C) 6 layers                    D) 7 layers                   E) None of these

Q8: Ethernet, token ring and token bus are types of?     [S B I Associates 2012]

A) W A N                   B) L A N                     C) Communication channels              D) Physical medium               E) None of the above

Q9: Which of the following items is not used in Local Area Networks (L A Ns)?   [S S C  C G L 2012]

A) Interfaced card                        B) Cable                        C) Computer                   D) Modem

Q10: Which is the name of the network topology in which there are bidirectional links between each possible node?       [S S C     C G L 2012]

A) Ring                B) Start                C) Tree                  D) Mesh

Q11: An alternate name for the completely interconnected network topology is:            [S S C           C G L    2012]

A) mesh              B) star                  C) tree                  D) ring

Find Your Answer Here

Q1: D), Q2: A), Q3: C), Q4: A), Q5: D), Q6: B), Q7: B), Q8: B), Q9: D), Q10: D), Q11: A)

Q1: The secret code that gives you access to some program is?          [Punjab And Sindh Bank Clerk, 2010]

A) clue               B) cue                    C) password            D) help                E) None of the above

Q2: Sending an E-mail is similar to?    [S B I Clerk 2011]

A) writing a letter                  B) drawing a picture                    C) talking on the phone                    D) sending a package    E) None of the above

Q3: Which of the following is the communication protocol that sets the standard used by every computer that accesses web-based information?            [S B I P. O. 2010]

A) X M L                         B) D M L                     C) H T T P                     D) H T M L                    E) None of the above

Q4: Which of the following is required to create an H T M L document?    [I B P S Clerk, 2011]

A) Browser                    B) Internet                          C) Text Editor                    D) Search engine                      E) None of the above

Q5: If you receive an E-mail from someone you don’t know what should you do?             [S B I Clerk, 2008]

A) Forward it to the police immediately.

B) Delete it without opening it.

C) Open it and respond to them saying that you don’t know them.

D) Reply and ask them for their personal information.

E) Reply and tell them you want to keep in touch with them.

Q1: C), Q2: A), Q3: C), Q4: C), Q5: B)

Customize your course in 30 seconds

Which class are you in.

tutor

  • Internet and World Wide Web

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Download the App

Google Play

  • Research Paper
  • Book Report
  • Book Review
  • Movie Review
  • Dissertation
  • Thesis Proposal
  • Research Proposal
  • Dissertation - Abstract
  • Dissertation Introduction
  • Dissertation Review
  • Dissertat. Methodology
  • Dissertation - Results
  • Admission Essay
  • Scholarship Essay
  • Personal Statement
  • Proofreading
  • Speech Presentation
  • Math Problem
  • Article Critique
  • Annotated Bibliography
  • Reaction Paper
  • PowerPoint Presentation
  • Statistics Project
  • Multiple Choice Questions
  • Resume Writing
  • Other (Not Listed)

Computer Networking (Essay Sample)

This essay was to demonstrate how different networks work.

Other Topics:

  • Construction Failure in Buildings Description: Construction Failure in Buildings Technology Essay Undergraduate level... 5 pages/≈1375 words | MLA | Technology | Essay |
  • Sample Decision Tree In Gambling Description: Sample Decision Tree In Gambling Technology Essay Undergraduate level... 1 page/≈275 words | MLA | Technology | Essay |
  • Evolution of the cellular phone Description: Evolution of the cellular phone Technology Essay Undergraduate level... 2 pages/≈550 words | MLA | Technology | Essay |
  • Exchange your samples for free Unlocks.
  • 24/7 Support

IMAGES

  1. Click here to view my essay on computer networks

    computer networks essay

  2. Computer Network Assignment Free Essay Example

    computer networks essay

  3. Essay On Internet for Students and Children (2023)

    computer networks essay

  4. What is Computer

    computer networks essay

  5. Principles of Computer Networks Essay Example

    computer networks essay

  6. 😍 Paragraph on computer networking. Computer Paragraph. 2022-11-09

    computer networks essay

VIDEO

  1. The Invasion part 35, EPILOGUE

  2. 5 Lines Essay On Computer

  3. Computer Essay|10 Lines on computer| write essay on computer #10linesessay #computer

  4. use of computer 🖥️ essay in English #english #essay #learnonline #essayparagraph #learnenglish

  5. Different Network layer design issues in Computer Networks By Jayamma Rodda

  6. Sackville: Ethical, Legal, Cultural and Environmental impact

COMMENTS

  1. Computer Networks Essay

    Computer network: A computer network is interconnection of more computing systems and their hardwares for storing and transmitting the data. These networks can be connected either wires or wireless. Connecting the systems without wires is called wireless technology. Connecting the computers , laptops , printers and gaming devices comes under ...

  2. Importance of Computer Networking

    A computer network allows for the sharing of resources such as printers, files, and data storage, as well as the ability to communicate with other computers and access the internet. Networking also enables collaboration between individuals and groups, and supports the transfer of data and information across a variety of platforms and devices.

  3. Concept and Types of the Computer Networks Definition Essay

    We will write a custom essay on your topic. According to Tamara (4), computer networks can either be private or public, depending on the type of configuration in the network. Public networks are configured with Public Internet Protocol, making them 'visible' to other connections outside the network. On the other hand, private networks are ...

  4. How do computer networks work?

    Computer Networking: A Top-Down Approach by James F. Kurose and Keith W. Ross. Pearson Education, 2017. A comprehensive guide to networking written in a clear, engaging way with plenty of meaningful examples. Computer Networks by Andrew S. Tanenbaum and David J. Wetherall. Pearson, 2013.

  5. Computer Networks

    A computer network or data network is a telecommunications network which allows computers to exchange data. In computer networks, networked computing devices exchange data with each other using a data link. The connections between nodes are established using either cable media or wireless media. The best-known computer network is the Internet.

  6. Computer networks (article)

    Computer networks. Google Classroom. The Internet is the world's largest computer network. Let's break that down: A computer network is any group of interconnected computing devices capable of sending or receiving data. A computing device isn't just a computer—it's any device that can run a program, such as a tablet, phone, or smart sensor.

  7. Department of Computer Science and Technology

    Past exam papers: Computer Networking. Solution notes are available for many past questions to local users. They were produced by question setters, primarily for the benefit of the examiners. These are not model answers: there may be many other good ways of answering a given exam question! The solution notes for the most recent two year's ...

  8. Computer Network Essays: Examples, Topics, & Outlines

    PAGES 1 WORDS 383. Computing networks are certainly changing. There are a couple of different factors driving these changes, which generally include issues of security, privacy, regulatory concerns, and technological advancements. For the most part, these drivers are resulting in positive changes for computer networks.

  9. Computer Networks Essay Example

    Free Computer Networks Essay Sample . Introduction. Computing Networks refers to networks which comprises of hardware and software components coupled with computers which are interconnected via communication channels which make it possible for the sharing of both hardware and software resources and information. Computing networks can be ...

  10. Computer Networks Essay Examples

    Computer Networks Essays. Essay on Routing Protocols. Overview Routing protocols refer to the mechanisms by which routing information exchange occurs between routers to ensure that routing decisions occur. They determine how the information exchanged reaches its destination or recipient and help make the entire process as efficient as possible ...

  11. The Computer Networks Information Technology Essay

    The Computer Networks Information Technology Essay. A computer network is the interconnection of computing devices in order to share data and is built with a combination of computer hardware and software WikiAnswers- Unknown author. Computer networks are used to connect multiple computers to an internet connection, or to printers, scanners, etc ...

  12. Computer network

    A computer network is a set of computers sharing resources located on or provided by network nodes.Computers use common communication protocols over digital interconnections to communicate with each other. These interconnections are made up of telecommunication network technologies based on physically wired, optical, and wireless radio-frequency methods that may be arranged in a variety of ...

  13. Computer networking essay

    Computer networking essay. Computer networking is a technology that connects devices together to share information and resources. This technology has become a vital part of modern-day communication and technology. Computer networking is used in various fields, including businesses, education, healthcare, government, and entertainment.

  14. Networking Concepts for Computer Science Students Essay

    Routers and firewalls are network connectivity devices that handle data packets on the network. The router will direct these data packets to their addressed destination on an internal as well as external scale. This is within or without the local area network (LAN). The firewall, on the other hand, is a hardware or software that secures a ...

  15. Computer Networks

    The International Journal of Computer and Telecommunications Networking Computer Networks is an international, archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in the computer communications networking area. The audience includes researchers, managers and operators of networks as well as designers and implementors.

  16. The Role of Computer Networks in Modern World

    Get original essay. A Network is a connection between different devices that share information and work in real time in harmony with software and hardware technology. Especially networks are used to connect this devices and computers to the internet. We can have also scanners and printers connected to the same area and network.

  17. Essay On Computer Networks

    Best Essays. 3132 Words. 13 Pages. Open Document. The Top Speeds of Computer Networks In this paper, the topic of computer network speeds will be discussed. The overlaying question that will be addressed in this paper will be "How fast can computer networks operate at?". The various connection types of Ethernet, Fiber Optic, and wireless ...

  18. What is Computer Network? Free Essay Example

    A computer network is a set of linked computers together for the purpose of sharing resources. The common resource shared today is a connection to the Internet. Other resources that are shared can include a printer or a file server. The Internet as a stand-alone can be considered a computer network. Other than sharing data, computer networks ...

  19. Essay: Introduction To Computer Networks

    Computer network is a method of interconnected computers and peripheral devices. For example, it may connect computers, printers, scanners and cameras.Using hardware and software, these interconnected computing devices can communicate with each other through defined rules of data communications.

  20. The History Of Computer Networks Information Technology Essay

    Development of the network began in 1969, based on designs developed during the 1960s. The ARPANET evolved into the modern Internet. History of Computer Networks In the 1960s, computer networking was essentially synonymous with mainframe computing and telephony services and the distinction between local and wide area networks did not yet exist.

  21. Computer Networking: What's Changed, What's Changing and What It Means

    And while innovations like 5G promise enhanced wireless experiences, further demands for reliability and speed as cloud tools become more sophisticated and complex may push office end users back to the future with next-gen, high-speed cables. Innovations in infrastructure march ever-forward in increasing speed and broadness of accessibility.

  22. Computer Network: Networking Practice Questions With Listed Answers

    A computer network is a collection of various computing machines that are able to share each other's resources in a mannerly fashion. A computer network is at the centre of all the modern processes and computational exercises. A computer network makes the world wide web possible.

  23. Computer Networking Essay

    Computer Networking (Essay Sample) Instructions: This essay was to demonstrate how different networks work. source.. Content: When it comes to computer networking, it is simply a method in which a particular company or individual decides on interconnecting several computer so as to share resources. There are several different types of networks ...