Computer_Networks_Important_Topics
Computer_Networks_Important_Topics
Digital transmission involves discrete binary data (0s and 1s), whereas analog transmission involves
continuous signals. Digital transmission is more reliable, with error detection and correction
Full duplex allows simultaneous two-way communication. Both devices can send and receive data at
the same time without waiting for the other to finish, improving communication efficiency.
MAN (Metropolitan Area Network) covers a city or a large campus, providing high-speed
connections within a limited area. WAN (Wide Area Network) covers broader geographical areas,
The OSI model has seven layers: Physical, Data Link, Network, Transport, Session, Presentation,
and Application. The TCP/IP model, used in practical networking, has four layers: Link, Internet,
Transport, and Application. OSI is a reference model for understanding network functions, while
5. Attenuation
Attenuation refers to the loss of signal strength over a distance. It occurs due to absorption,
scattering, and other factors as the signal propagates through a medium. The longer the distance,
Point-to-Point Protocol (PPP) is a data link layer protocol used to establish direct connections
between two nodes, often in dial-up internet connections. It supports authentication, encryption, and
CSMA/CD (Carrier Sense Multiple Access with Collision Detection) is used in wired networks like
Ethernet. It detects collisions and retransmits data if needed. CSMA/CA (Collision Avoidance) is
used in wireless networks, preventing collisions by checking if the channel is clear before sending
data.
Congestion control policies help manage and reduce network congestion. Techniques include traffic
shaping, TCP windowing, and fair queueing. These methods ensure data flow remains efficient
9. Internetworking
Internetworking refers to the connection of different types of networks to form a larger, global
network. It enables communication between separate networks, often using routers and internet
10. Cryptography
using encryption. Only authorized users with the correct decryption key can read the data. It ensures