Tutorial
Physical Layer
Data Link layer
Network Layer
Routing Algorithm
Transport Layer
Application Layer
Network Security
Misc
- Router
- OSI vs TCP/IP
- TCP vs UDP
- Transmission Control Protocol
- TCP port
- IPv4 vs IPv6
- ARP Packet Format
- ARP Table
- Working of ARP
- FTP Client
- FTP Commands
- FTP Server
- I2C Protocol
- Sliding Window Protocol
- SPI Protocol
- IP
- ARP Commands
- ARP
- Address Resolution Protocol
- ARP and its types
- TCP Retransmission
- CAN protocol
- HTTP Status Codes
- HTTP vs HTTPS
- RIP Protocol
- UDP Protocol
- ICMP Protocol
- MQTT protocol
- OSPF Protocol
- Stop and Wait Protocol
- IMAP Protocol
- POP Protocol
- CIFS
- DAS
- DIMM
- iSCSI
- NAS (Network Attached Storage)
- NFS
- NVMe
- SAN
- Border Gateway Protocol
- Go-Back-N ARQ
- RJ Cable
- Difference between Connection-Oriented and Connectionless Service
- CDMA vs. GSM
- What is MAC Address
- Modem vs. Router
- Switch Vs. Router
- USB 2.0 vs 3.0
- Difference between CSMA CA and CSMA CD
- Multiple access protocol- ALOHA, CSMA, CSMA/CA and CSMA/CD
- URI vs URL
- IMAP vs. POP3
- SSH Meaning| SSH Protocol
- UTP vs STP
- Status Code 400
- MIME Protocol
- IP address
- proxy server
- How to set up and use a proxy server
- network security
- WWW is based on which model
- Proxy Server List
- Fundamentals of Computer Networking
- IP Address Format and Table
- Bus topology and Ring topology
- Bus topology and Star topology
- Circuit Switching and Packet switching?
- Difference between star and ring topology
- Difference between Router and Bridge
- TCP Connection Termination
- Image Steganography
- Network Neutrality
- Onion Routing
- Adaptive security appliance (ASA) features
- Relabel-to-front Algorithm
- Types of Server Virtualization in Computer Network
- Access Lists (ACL)
- What is a proxy server and how does it work
- Digital Subscriber Line (DSL)
- Operating system based Virtualization
- Context based Access Control (CBAC)
- Cristian's Algorithm
- Service Set Identifier (SSID)
- Voice over Internet Protocol (VoIP)
- Challenge Response Authentication Mechanism (CRAM)
- Extended Access List
- Li-fi vs. Wi-fi
- Reflexive Access List
- Synchronous Optical Network (SONET)
- Wifi protected access (WPA)
- Wifi Protected Setup (WPS)
- Standard Access List
- Time Access List
- What is 3D Internet
- 4G Mobile Communication Technology
- Types of Wireless Transmission Media
- Best Computer Networking Courses
- Data Representation
- Network Criteria
- Classful vs Classless addressing
- Difference between BOOTP and RARP in Computer Networking
- What is AGP (Accelerated Graphics Port)
- Advantages and Disadvantages of Satellite Communication
- External IP Address
- Asynchronous Transfer Mode (ATM)
- Types of Authentication Protocols
- What is a CISCO Packet Tracer
- BOOTP work
- Subnetting in Computer Networks
- Mesh Topology Advantages and Disadvantages
- Ring Topology Advantages and Disadvantages
- Star Topology Advantages and Disadvantages
- Tree Topology Advantages and Disadvantages
- Zigbee Technology-The smart home protocol
- Network Layer in OSI Model
- Physical Layer in OSI Model
- Data Link Layer in OSI Model
- Internet explorer shortcut keys
- Network Layer Security | SSL Protocols
- Presentation Layer in OSI Model
- Session Layer in OSI Model
- SUBNET MASK
- Transport Layer Security | Secure Socket Layer (SSL) and SSL Architecture
- Functions, Advantages and Disadvantages of Network Layer
- Protocols in Noiseless and Noisy Channel
- Advantages and Disadvantages of Mesh Topology
- Cloud Networking - Managing and Optimizing Cloud-Based Networks
- Collision Domain and Broadcast Domain
- Count to Infinity Problem in Distance Vector Routing
- Difference Between Go-Back-N and Selective Repeat Protocol
- Difference between Stop and Wait, GoBackN, and Selective Repeat
- Network Function Virtualization (NFV): transforming Network Architecture with Virtualized Functions
- Network-Layer Security | IPSec Modes
- Next - Prev Network-Layer Security | IPSec Protocols and Services
- Ping vs Traceroute
- Software Defined Networking (SDN): Benefits and Challenges of Network Virtualization
- Software Defined Networking (SDN) vs. Network Function Virtualization (NFV)
- Virtual Circuits vs Datagram Networks
- BlueSmack Attack in Wireless Networks
- Bluesnarfing Attack in Wireless Networks
- Direct Sequence Spread Spectrum
- Warchalking in Wireless Networks
- WEP (Wired Equivalent Privacy)
- Wireless security encryption
- Wireless Security in an Enterprise
- Quantum Networking
- Network Automation
- Difference between MSS and MTU
- What is MTU
- Mesh Networks: A decentralized and Self-Organizing Approach to Networking
- What is Autonomous System
- What is MSS
- Cyber security & Software security
- Information security & Network security.
- Security Engineer & Security Architect
- Protection Methods for Network Security
- Trusted Systems in Network Security
- What are Authentication Tokens in Network security
- Cookies in Network Security
- Intruders in Network Security
- Network Security Toolkit (NST) in virtual box
- Pivoting-Moving Inside a Network
- Security Environment in Computer Networks
- Voice Biometric technique in Network Security
- Advantages and Disadvantages of Conventional Testing
- Difference between Kerberos and LDAP
- Cyber security and Information Security
- GraphQL Attacks and Security
- Application Layer in OSI Model
- Applications of Remote Sensing
- Seven Layers of IT Security
- What is Ad Hoc TCP
- What is Server Name Indication(SNI)
Network Criteria
A Network is a group of connected devices capable of communicating. The device can be a computer, printer, or scanner that either receives or transmits data. The devices connected in the Network are called "Nodes," and the means of connection can be wired or wireless.
This tutorial explains the criteria a computer network must attain to fulfill all the connected nodes' needs properly.
There are a lot of criteria that make a network better than others, but; there are three basic yet important criteria to be fulfilled for a network:
- Performance
- Reliability
- Security
Performance
It measures how well a network can support communication between two nodes in the Network or with nodes of other networks in the global scope. The two major tasks in a network are the Transmission and reception of information. We need to focus on how fast a message is transmitted and how fast a node can receive a request and find the needed information. Hence, to measure the performance of a network, here are the major factors to be considered:
- Transit time: The total time a node takes to transmit a message from the beginning until the last character of the message. Transit stands for Transmission.
- Response time: The total time a node takes to process an inquiry or a request from another node/ device and respond. It is the time between the inquiry's end and the response's beginning.
- Throughput: Throughput measures how much data is transferred successfully from the sender node to the receiver node in a particular time frame. It is measured in bits per second or data per second.
- Bandwidth: The maximum possible throughput capacity of the Network. We can measure it in bits, megabits, or gigabits per second. It defines the highest limit.
- Delay/ Latency: As we discussed, Throughput is the number of data packets successfully delivered in a given time. Delay is the measure of time taken to do the delivery.
Important points:
- A network with high Throughput and less latency is ideal, but Throughput and latency always lie on two sides of the coin and are always proportional. If we try to automatically increase the data packet transfer, the time taken is also increased.
- Throughput and bandwidth might seem similar, but they are different. Bandwidth is conceptual, while Throughput is practical. Bandwidth is like the vehicle limit of a highway. The number of vehicles/ data packets we are allowing is the Throughput.
- Both Bandwidth and Throughput are important for the Network's speed. For fast data transfer, we can transfer more data packets, but too much data/ vehicles reduce the speed and might cause congestion; there is only one way than making the bandwidth wider. Hence, bandwidth is important though conceptual.
- Several other factors influence a network's performance:
- Number of users
- Hardware capability
- Transmission media used.
- Software efficiency
- Jitter (disturbance)
- Latency and Throughput are the two networking metrics that are periodically measured to keep up with the performance of the Network.
Reliability
It is the degree to which a network is trustworthy, consistent, and dependable. The Reliability of a network is measured by the frequency of failures it is undergoing and the time it takes to recover from the failures. Overall, the Robustness of the Network at times of catastrophic events is measured to check how reliable the Network is.
Security
It measures how the Network secures the data amid failures and attacks and the policies and procedures it implements to protect itself from damages and unauthorized access. In Reliability, the frequency of failures is checked. In Security, network attacks and data breaches are checked.
Overall goals of a typical network:
- Scarce resources sharing
- Feasibility
- Better performance
- High Reliability
- High Security
- Inter-process communications
- Flexible access to authorized clients
Final Summary about the three major Network criteria:
- Performance: The performance of a network is measured by measuring the Throughput and Delay of the Network. The ideal type of Network is supposed to have high Throughput and low delay, which are two proportional metrics. Other important factors determining a network's performance are Transit time and Response time.
- Reliability: The Reliability of a network lies in how robust the Network is amid sudden major catastrophic events/ failures.
- Security: It is how the Network protects all the important data and information at times of data breaches, unauthorized logins, damages, and viruses.