Computer Networks Notes

  • Basics of Computer Networks

    After going through this unit, you should be able to: \n\n- understand the concept of computer networks;\n- differentiate between different types of computer networks;\n- understand the different application of networks;\n- compare the different network topologies;\n- signify the importance of network protocols;\n- know the importance of using networked system;\n- understand the layered organisation and structuring of computer networks using OSI and TCP/IP reference model\n- have a broad idea about some of the popular networks like Novell network, ARPANET, INTERNET, ATM etc., and\n- understand the concept of delays."},{"left":"","right


  • Network Layers

    The Physical Layer","right":"- Deals with transmitting raw bits over a communication channel\n- How many volts for 1 or 0\n- How many microseconds a bit lasts\n- Mechanics, electrical and procedural


  • Routers and Addressing

    ![](https://s3.amazonaws.com/classmint.img/19ef5640-3d4f-4d23-99c7-20975d03d0aa.png) \n![](https://s3.amazonaws.com/classmint.img/aad0c62b-bd2e-4d97-913e-d858f4dbb700.png) \nA repeater forwards every bit; it has no filtering capability. "},{"le


  • Security in Networks

    Basic Security Needs: \n\n- A computer is secure if you can depend on it and its software to behave as you expect.\n- No system is completely secure unless it is turned off (susceptible to being stolen).\n- Any time the system is on, it is susceptible to attack, from Trojan horse to Virus.\n- Proper installation and configuration of operating system required to secure the system to acceptable level of risk.\n- Preventing unauthorized access to sensitive data.\n- Protect files, memory and configuration settings from unwanted viewing and modification\n- Web security is essential for protecting web servers, web users, and their surrounding organizations."},{"left":"DEFINITION


  • Remote Login - Telnet

    ,"right":"_Telnet_ \n_TELNET is a general-purpose client-server application program.TELNET enables the establishment of a connection to a remote system in such a way that the local terminal appears to be a terminal at the remote system._ \n\n_ _"},{"left":"L


  • Stream Control Transmission Protocol

    _Upon completion you will be able to: \n•Be able to name and understand the services offered by SCTP \n•Understand SCTP’s flow and error control and congestion control \n•Be familiar with the fields in a SCTP segment \n•Understand the phases in an SCTP association \n•Understand the SCTP state transition diagram \n• SCTP is a message-oriented, reliable protocol that combines the good features of UDP and TCP._ "},{"left":"SCTP S


Sign Up Free