Computer networks provide a powerful communication medium. A network consists of two or more nodes (e.g. Go ahead and login, it'll take only a minute. Because of this imbalances more powerful personal computers are developed and are able to share data and other resources kept on one or more shared file server machines. Writing code in comment? Please mail your requirement at hr@javatpoint.com. There are many organization which use computer for management of various fields. Starting from the basic needs these computers were connected to each other resulting into a computer network. High Reliability – Difference between Unipolar, Polar and Bipolar Line Coding Schemes, Network Devices (Hub, Repeater, Bridge, Switch, Router, Gateways and Brouter), Transmission Modes in Computer Networks (Simplex, Half-Duplex and Full-Duplex), Difference between Broadband and Baseband Transmission, Multiple Access Protocols in Computer Network, Difference between Byte stuffing and Bit stuffing, Controlled Access Protocols in Computer Network, Sliding Window Protocol | Set 1 (Sender Side), Sliding Window Protocol | Set 2 (Receiver Side), Sliding Window Protocol | Set 3 (Selective Repeat), Sliding Window protocols Summary With Questions. d Networking supports communication among multiple entities Program to remotely Power On a PC over the internet using the Wake-on-LAN protocol. Being the most popular educational website in India, we believe in providing quality content to our readers. Now some times it becomes necessary to load same program files. Cost reduction by sharing hardware & software resources. Thus … It is easy for two or more people living far apart to work on same project by portioning it using a network. Various transmission media channels were used to make a network. The criteria that have to be met by a computer network are: 1. Networking Elements – The computer network includes the following networking elements: Network Criteria: A group of office workers can share a common printer, fax, modem, scanner etc. Various transmission media channels were used to make a network. Computer networks provide a powerful communication medium. Some of its main uses are as follows − Information and Resource Sharing − Computer networks allow organizations having units which are placed apart from each other, to share information in a very effective manner. Reliability – It is measured in terms of. It means to make all programs peripherals and data available to any one computer on the network to all other computers in the network … It's the best way to discover useful content. Why Standardize? Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below. What is a computer network? • The best example of computer network is the Internet. Please write to us at contribute@geeksforgeeks.org to report any issue with the above content. It also allows sharing of hardware equipment, like printers and scanners among varied … acknowledge that you have read and understood our, GATE CS Original Papers and Official Keys, ISRO CS Original Papers and Official Keys, ISRO CS Syllabus for Scientist/Engineer Exam, Types of area networks – LAN, MAN and WAN, Introduction of Mobile Ad hoc Network (MANET), Redundant Link problems in Computer Network. Write detailed comment, relevant to the topic. Starting from the basic needs these computers were connected to each other resulting into a computer network. High reliability by having multiple sources of supply. How Address Resolution Protocol (ARP) works? Application architecture is of two types: Characteristics Of Client-server architecture: Disadvantage Of Client-server architecture: It is a single-server based architecture which is incapable of holding all the requests from the clients. Another goal is saving money. The application architecture, on the other hand, is designed by the application developer and defines how the application should be structured over the various end systems. Download our mobile app and study on-the-go. Program to calculate the Round Trip Time (RTT), Introduction of MAC Address in Computer Network, Maximum Data Rate (channel capacity) for Noiseless and Noisy channels, Difference between Unicast, Broadcast and Multicast in Computer Network, Collision Domain and Broadcast Domain in Computer Network, Internet Protocol version 6 (IPv6) Header, Program to determine class, Network and Host ID of an IPv4 address, C Program to find IP Address, Subnet Mask & Default Gateway, Introduction of Variable Length Subnet Mask (VLSM), Types of Network Address Translation (NAT), Difference between Distance vector routing and Link State routing, Routing v/s Routed Protocols in Computer Network, Route Poisoning and Count to infinity problem in Routing, Open Shortest Path First (OSPF) Protocol fundamentals, Open Shortest Path First (OSPF) protocol States, Open shortest path first (OSPF) router roles and configuration, Root Bridge Election in Spanning Tree Protocol, Features of Enhanced Interior Gateway Routing Protocol (EIGRP), Routing Information Protocol (RIP) V1 & V2, Administrative Distance (AD) and Autonomous System (AS), Packet Switching and Delays in Computer Network, Differences between Virtual Circuits and Datagram Networks, Difference between Circuit Switching and Packet Switching. Programs and software in any computer can be accessed by other computers linked to the network. You'll get subjects, question papers, their solution, syllabus - All in one app. Computer networks have become invaluable to organizations as well as individuals. A network consists of two or more nodes (e.g. For example, all files could be replicated on two or three machines, so if one of them is unavailable, the … Communication Medium :The goal of a computer network is to provide a powerful communication medium among widely separated people. Network Virtual terminal: An application layer allows a user to log on to a remote host. What should we use main() or void main() or int main() ? Basic Network Attacks in Computer Network, Introduction of Firewall in Computer Network, Types of DNS Attacks and Tactics for Security, Active and Passive attacks in Information Security, LZW (Lempel–Ziv–Welch) Compression technique, RSA Algorithm using Multiple Precision Arithmetic Library, Weak RSA decryption with Chinese-remainder theorem, Implementation of Diffie-Hellman Algorithm, HTTP Non-Persistent & Persistent Connection | Set 2 (Practice Question), Commonly asked Computer Networks Interview Questions | Set 1, Computer Networks | IP Addressing | Question 5, Computer Networks | IP Addressing | Question 6, Producer Consumer Problem using Semaphores | Set 1, Page Replacement Algorithms in Operating Systems, Write Interview