Computer Networks


A network is a group of devices (called nodes) that are connected by communication links. A node can be a computer, printer or any other device, which is capable of sending and receiving network data.

Computer network is a digital telecommunications network that allows nodes to share resources. In the computer network, computing devices exchange data with each other using the connection (data link) between the nodes. A computer network is essentially a collection of interactive autonomous computers by a single technology. If they are able to exchange information, then two computers are interconnected.



1. Network Goals 


Resource Sharing: It is a piece of information on a computer that can be remotely accessed from another computer, usually through an enterprise intranet, transparently as it was a resource in the local machine. Network sharing is possible through interoperability communication over the network.



The goal of sharing resources is to provide all programs, data and equipment to anyone on the network regardless of the resource and user's physical location. The offices of the modern organization are located in different parts of the country and the world. To share information about the entire organization, it is necessary to add a computer to all these places.


Provide High Reliability:
In computer networking, a trusted protocol is a protocol that indicates to the sender whether the delivery of data was successful to the intended recipient.


High reliability ensures that network devices, data, and links are available at all times. It can be obtained from the alternative source of supply. For example, having a backup server, replication of files on more than one machine ensures the availability of data and files from at least one source. Having multiple CPUs means that if someone fails, the other can handle their work. It is very important in military, banking, air traffic control, and similar applications.


Distribution of Workload:

Workload contains some amount of application programming in the computer and usually, some users are connected to and interacting with computer applications.


A large and complex task can be distributed among several processors in the network. Or if a computer becomes saturated with too much load, the work can be distributed to other computers on the network.

Saving Money:
It is economical to set up a network of small computers in large numbers compared to investing in some big people. Data on the network can be placed on one or more shared, powerful file server machines.


One network makes it easy for everyone to access the same file, and people inadvertently stop creating different versions. The network also allows many employees to share the same printer. Although you may need a more expensive printer to handle additional workloads, it is still economical to use a network printer, which connects to a different printer for each computer in your office.


Expandability: Expanding a computer system to adjust its capabilities or additions to capabilities From a hardware perspective, expendability may include extra or large hard disks and more storage. Network size and performance can be gradually increased by adding more processor and communication devices.


Powerful Communication Medium:  A communication medium is simply how your message is sent to the receiver. It is often known as the communication channel.


Using the network is easy for many people to communicate effectively. It enhances human-to-human communication because, in remote geographical areas, people can easily share and share information, ideas, and technology.


Protecting Information:

A network provides a secure environment for important data of an organization. They provide an additional layer of protection through user accounts, logins, and passwords. Different levels of access to the network can be set. The main goal is to ensure that information is properly protected from modification or disclosure. It should define the sensitivity level of information.



Preserving Information: 

Preserving metadata is a key component of digital shielding, and includes information that documents the preservation process. Supports group management practices and allows organizations or individuals to understand the nursery chain.

The information can be backed up in a central location or several backup servers. Allows all computers in the network to access the information at a later time. This information can be stored for many years and can be provided when needed.




2. Applications of Computer Networks

Telecommunication:


Transmission links connect nodes together. Telecommunication facilitates negotiation and information transfer at a great distance. Businesses use telecommunications to expand and develop their network. With the Internet, computer and telephone network, businesses can allocate their resources efficiently.

Mobile devices such as phones, personal digital assistants and digital notebooks are being used fast today. Wireless communication technologies are getting better and getting secure. It enables users to access anywhere and at anytime for information. Mobile applications include information about home networks, inventory tracking systems, military applications, m-commerce, location-based services such as advertising, mobile maps, emergency services such as emergency services etc.

Business Applications:

A computer network provides a powerful communication medium for business. Daily communication can be done using e-mail, reports, charts and other such documents. Video-conferencing enables employees to organize virtual meetings in far-off places, thus eliminating the cost and time.

Companies can do business electronically with other companies, suppliers and customers. This not only saves time and cost but also reduces the need for large inventions, which results in increased efficiency.


One of the most important applications in the computer network for business is resource sharing. Large organizations, their employees, customers, and other stakeholders can share resources. It enables all programs, devices, and data available to anyone on the network regardless of the processing and user's physical location. The goal is to create all programs, devices (such as printers, etc.), and especially data, which is available to anyone on the network regardless of the resource and user's physical location.

One major application of computer network is e-commerce, i.e. doing business with consumers on the Internet. Recently, doing business using M-commerce, mobile devices, is gaining popularity. Banks, airlines, bookstores, retailers, etc. allow consumers to trade online by providing online catalogs and taking an online order.

Electronic Data Transfer:





⟶Electronic data interchange is the transfer of data from one computer system to another by formatting standardized message without the need for human intervention. Electronic data interchange allows many companies - possibly in different countries - to exchange documents electronically. Data can be exchanged through serial links and peer-to-peer networks, although most exchange dependencies are currently dependent on the Internet for connectivity.

⟶The electronic data interchange message contains a string of data elements, each representing a singular fact, such as a value, product model number, and after it, is separated by a delimiter. The entire string is called the data segment. One or more data segments created by the header and the trailer have a transaction set, which is the electronic data interchange unit (transmission of the message) of the transmission. A transaction set often contains the same thing that is usually contained in a specific business document or form.

⟶Electronic data interchange applies to orders like purchase orders, invoices, shipping notices and commission sales reports, as well as other important or classified information. For example, an insurance company can verify that an applicant has a driving license through electronic data interchange exchange.

Home Applications:

The five most common uses of computer networks for home users are as follows:

Access to remote information: Includes the World Wide Web for detailed information on many topics, accessing on-line libraries, getting daily updates on stock and stock, reading newspapers, magazines and magazines. All of these include the interaction between a person and a remote database.

Person-to-person communication: This includes e-mails, chatting, instant messaging and social networking which are used by millions of people on a daily basis. Audio, video, text and pictures can be shared in real-time. Newsgroups are common, where any topic can be discussed between a select group of people. Internet telephony enables users to talk over the Internet.

Education: Computer networks like the Internet and the World Wide Web are being used for rapid education. This area is called telelearning or e-learning. Users can register for online courses operated by educational institutions and colleagues. M-learning is also an emerging area using mobile devices.

 Entertainment: This is a huge and growing industry. These applications include video on demand where it is possible to select any film or television program and it is displayed on screen immediately, interactive films and television programs, multi-person and real-time sports games and three-dimensional virtual reality applications.

Electronic Commerce: In recent times, more and more home users are making purchases at home by accessing online catalogs. People use financial institutions, pay bills, manage investments, manage bank accounts electronically.

3. Social Issues


Ethical, economic and political problems. Some of these problems are listed below. People using computer networks should be aware of these issues and should use the network wisely for the benefit of society on a large scale.
  • Posting objectionable messages and comments against any person, religion or political group in discussion forums or newsgroups.
  • Send pictures and video clips which are inappropriate to watch pornography in particular.
  • Record and post live videos during sensitive and unstable conditions.
  • Users can send anonymous messages using the network. In some cases, it is desirable because it can bring light issues, problems and wrong actions in the society. But people also use it to spoil the reputation of people and organizations and to harm them.
  • Information is available at our fingertips using the Internet. However, not all information is correct or valid. Many of the information is ill, misleading or even wrong. People should be careful in using important information like medical, financial, etc.
  • Millions of email addresses are sold to marketing companies sending unwanted and unwanted emails.
  • Active programs such as spyware and malware are introduced in computers through the Internet, which can damage data, applications, and hardware.
  • Antisocial and criminal elements stole the user's financial information such as credit card information, bank account details, etc. and use this information as a way to do so.
There is no quick way to solve these problems. People should be aware of their social responsibility and should work properly. Internet service providers should have mechanisms to censor illegal content without violating the freedom of expression of users. Governments and organizations spying on user data to monitor illegal activities. However, this information should be kept confidential. Implementation of strict security policies like certification, encroachment, and integration will help in solving some problems.