Signed in as:
filler@godaddy.com
Signed in as:
filler@godaddy.com
What is computer networking?
Networking, or computer networking, is the process of connecting two or more computing devices, such as desktop computers, mobile devices, routers or applications, to enable the transmission and exchange of information and resources.
Networked devices rely on communications protocols—rules that describe how to transmit or exchange data across a network—to share information over physical or wireless connections.
Before contemporary networking practices, engineers would have to physically move computers to share data between devices, which was an unpleasant task at a time when computers were large and unwieldy. To simplify the process (especially for government workers), the Department of Defense funded the creation of the first functioning computer network (eventually named ARPANET) in the late 1960s.
Since then, networking practices—and the computer systems that drive them—have evolved tremendously. Today’s computer networks facilitate large-scale inter-device communication for every business, entertainment and research purpose. The internet, online search, email, audio and video sharing, online commerce, live-streaming and social media all exist because of advancements in computer networking.
Key networking components and devices
Before we delve into more complex networking topics, it’s important to understand fundamental networking components, including:
Types of computer networks
Typically, computer networks are defined by geographical area. A local area network (LAN) connects computers in a defined physical space, while a wide area network (WAN) can connect computers across continents. However, networks are also defined by the protocols they use to communicate, the physical arrangement of their components, how they manage network traffic and the purpose they serve in their respective environments.
Here, we’ll discuss the most common and widely used computer network types in three broad categories.
The network types in this category are distinguished by the geographical area the network covers.
A LAN connects computers over a relatively short distance, such as those within an office building, school or hospital. LANs are typically privately owned and managed.
As the name implies, a WAN connects computers across large geographical areas, such as regions and continents. WANs often have collective or distributed ownership models for network management purposes. Cloud networks serve as one example, since they’re hosted and delivered by public and private cloud infrastructures across the globe.
A software-defined wide area network (SD-WAN) is a virtualized WAN architecture that uses SDN principles to centralize the management of disconnected WAN networks and optimize network performance.
MANs are larger than LANs but smaller than WANs. Cities and government entities typically own and manage MANs.
A PAN serves one person. If a user has multiple devices from the same manufacturer (an iPhone and a MacBook, for instance), it’s likely they've set up a PAN that shares and syncs content—text messages, emails, photos and more—across devices.
Network nodes can send and receive messages using either wired or wireless links (connections).
Wired network devices are connected by physical wires and cables, including copper wires and Ethernet, twisted pair, coaxial or fiber optic cables. Network size and speed requirements typically dictate the choice of cable, the arrangement of network elements and the physical distance between devices.
Wireless networks forgo cables for infrared, radio or electromagnetic wave transmission across wireless devices with built-in antennae and sensors.
Computing networks can transmit data using a range of transmission dynamics, including:
In a multipoint network, multiple devices share channel capacity and network links.
Network devices establish a direct node-to-node link to transmit data.
On broadcast networks, several interested “parties” (devices) can receive one-way transmissions from a single sending device. Television stations are a great example of broadcast networks.
A VPN is a secure, point-to-point connection between two network endpoints. It establishes an encrypted channel that keeps a user’s identity and access credentials, as well as any data transferred, inaccessible to hackers.
Network architectures
Computer network architecture establishes the theoretical framework of a computer network, including design principles and communications protocols.
Primary types of network architectures
Network topology
Whereas architecture represents the theoretical framework of a network, topology is the practical implementation of the architectural framework. Network topology describes the physical and logical arrangement of nodes and links on a network, including all hardware (routers, switches, cables), software (apps and operating systems) and transmission media (wired or wireless connections).
Common network topologies include bus, ring, star and mesh.
In a bus network topology, every network node is directly connected to a main cable. In a ring topology, nodes are connected in a loop, so each device has exactly two neighbors. Adjacent pairs are connected directly and nonadjacent pairs are connected indirectly through intermediary nodes. Star network topologies feature a single, central hub through which all nodes are indirectly connected.
Mesh topologies are a bit more complex, defined by overlapping connections between nodes. There are two types of mesh networks—full mesh and partial mesh. In a full mesh topology, every network node connects to every other network node, providing the highest level of network resilience. In a partial mesh topology, only some network nodes connect, typically those that exchange data most frequently.
Full mesh topologies can be expensive and time-consuming to run, which is why they’re often reserved for networks that require high redundancy. Partial mesh, on the other hand, provides less redundancy but is more cost-effective and simpler to run.
Regardless of subtype, mesh networks have self-configuration and self-organization capabilities; they automate the routing process, so the network always finds the fastest, most reliable data path.
Network communication protocols
Whether it’s the internet protocol (IP) suite, Ethernet, wireless LAN (WLAN) or cellular communication standards, all computer networks follow communication protocols—sets of rules that every node on the network must follow in order to share and receive data. Protocols also rely on gateways to enable incompatible devices to communicate (a Windows computer attempting to access Linux servers, for instance)
Many modern networks run on TCP/IP models, which include four network layers.
Though TCP/IP is more directly applicable to networking, the Open Systems Interconnection (OSI) model—sometimes called the OSI reference model—has also had a substantial impact on computer networking and computer science, writ broadly.
OSI is a conceptual model that divides network communication into seven abstract layers (instead of four), providing a theoretical underpinning that helps engineers and developers understand the intricacies of network communication. The OSI model's primary value lies in its educational utility and its role as a conceptual framework for designing new protocols, making sure that they can interoperate with existing systems and technologies.
However, the TCP/IP model's practical focus and real-world applicability have made it the backbone of modern networking. Its robust, scalable design and horizontal layering approach has driven the explosive growth of the internet, accommodating billions of devices and massive amounts of data traffic.
How does a computer network work?
Using email as an example, let’s walk through an example of how data moves through a network.
If a user wants to send an email, they first write the email and then press the “send” button. When the user presses “send,” an SMTP or POP3 protocol uses the sender’s wifi to direct the message from the sender node and through the network switches, where it’s compressed and broken down into smaller and smaller segments (and ultimately into bits, or strings of 1s and 0s).
Network gateways direct the bit stream to the recipient’s network, converting data and communication protocols as needed. When the bit stream reaches the recipient’s computer, the same protocols direct the email data through the network switches on the receiver’s network. In the process, the network reconstructs the original message until the email arrives, in human-readable form, in the recipient’s inbox (the receiver node).
Why use computer networks?
Computer networks are inescapable, present in many aspects of modern life. In business, relying on computer networks isn’t an option—they are fundamental to the operation of modern enterprises.
Computer networks provide numerous benefits, including:
Networking enables every form of digital communication, including email, messaging, file sharing, video calls and streaming. Networking connects all the servers, interfaces and transmission media that make business communication possible.
Without networking, organizations would have to store data in individual data repositories, which is unsustainable in the age of big data. Computer networks help teams keep centralized data stores that serve the entire network, freeing up valuable storage capacity for other tasks.
Users, network administrators and developers alike stand to benefit from how networking simplifies resource and knowledge sharing. Networked data is easier to request and fetch, so users and clients get faster responses from network devices. And for those on the business side, networked data makes it easier for teams to collaborate and share information as technologies and enterprises evolve.
Not only are well-built networking solutions more resilient, but they also offer businesses more options for cybersecurity and network security. Most network providers offer built-in encryption protocols and access controls (such as multifactor authentication) to protect sensitive data and keep bad actors off the network.
Check out this great video
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.