Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
5 views

computer network

A computer network connects multiple computing devices to share and transmit information, utilizing both wired and wireless links. Key components include nodes (devices) and links, governed by communication protocols, while various types of networks exist based on size and purpose. Effective network management practices are essential for performance, security, and resource sharing in modern organizations.

Uploaded by

maskark01
Copyright
© © All Rights Reserved
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

computer network

A computer network connects multiple computing devices to share and transmit information, utilizing both wired and wireless links. Key components include nodes (devices) and links, governed by communication protocols, while various types of networks exist based on size and purpose. Effective network management practices are essential for performance, security, and resource sharing in modern organizations.

Uploaded by

maskark01
Copyright
© © All Rights Reserved
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 7

What Is a Computer Network?

A computer network is a system that connects two or more computing devices for
transmitting and sharing information. Computing devices include everything from a
mobile phone to a server. These devices are connected using physical wires such as
fiber optics, but they can also be wireless.

Key Components of a Computer Network


From a broader lens, a computer network is built with two basic blocks: nodes or
network devices and links. The links connect two or more nodes with each other. The
way these links carry the information is defined by communication protocols. The
communication endpoints, i.e., the origin and destination devices, are often called
ports.

A computer network is defined as a system that connects two or more computing


devices for transmitting and sharing information. This article explains computer
network in detail, along with its types, components, and best practices for 2022.

Table of Contents
What Is a Computer Network?
Key Components of a Computer Network
Types of Computer Networks
Key Objectives of Creating and Deploying a Computer Network
Top 10 Best Practices for Computer Network Management in 2022
What Is a Computer Network?
A computer network is a system that connects two or more computing devices for
transmitting and sharing information. Computing devices include everything from a
mobile phone to a server. These devices are connected using physical wires such as
fiber optics, but they can also be wireless.

The first working network, called ARPANET, was created in the late 1960s and was
funded by the U.S. Department of Defense. Government researchers used to share
information at a time when computers were large and difficult to move. We have come
a long way today from that basic kind of network. Today�s world revolves around the
internet, which is a network of networks that connects billions of devices across
the world. Organizations of all sizes use networks to connect their employees�
devices and shared resources such as printers.

An example of a computer network at large is the traffic monitoring systems in


urban cities. These systems alert officials and emergency responders with
information about traffic flow and incidents. A simpler example is using
collaboration software such as Google Drive to share documents with colleagues who
work remotely. Every time we connect via a video call, stream movies, share files,
chat with instant messages, or just access something on the internet, a computer
network is at work.

Computer networking is the branch of computer science that deals with the ideation,
architecture, creation, maintenance, and security of computer networks. It is a
combination of computer science, computer engineering, and telecommunication.

See More: Building a Disaster Preparedness Strategy? Here�s How Leading Service
Providers Can Help

Key Components of a Computer Network


From a broader lens, a computer network is built with two basic blocks: nodes or
network devices and links. The links connect two or more nodes with each other. The
way these links carry the information is defined by communication protocols. The
communication endpoints, i.e., the origin and destination devices, are often called
ports.

Main Components of a Computer Network


Main Components of a Computer Network

1. Network Devices
Network devices or nodes are computing devices that need to be linked in the
network. Some network devices include:

Computers, mobiles, and other consumer devices: These are end devices that users
directly and frequently access. For example, an email originates from the mailing
application on a laptop or mobile phone.
Servers: These are application or storage servers where the main computation and
data storage occur. All requests for specific tasks or data come to the servers.
Routers: Routing is the process of selecting the network path through which the
data packets traverse. Routers are devices that forward these packets between
networks to ultimately reach the destination. They add efficiency to large
networks.
Switches: Repeaters are to networks what transformers are to electricity grids�they
are electronic devices that receive network signals and clean or strengthen them.
Hubs are repeaters with multiple ports in them. They pass on the data to whichever
ports are available. Bridges are smarter hubs that only pass the data to the
destination port. A switch is a multi-port bridge. Multiple data cables can be
plugged into switches to enable communication with multiple network devices.
Gateways: Gateways are hardware devices that act as �gates� between two distinct
networks. They can be firewalls, routers, or servers.
Learn More: Why a Network Management Card Is Essential to Secure Enterprise
Networks from Cyber Threats

2. Links
Links are the transmission media which can be of two types:

Wired: Examples of wired technologies used in networks include coaxial cables,


phone lines, twisted-pair cabling, and optical fibers. Optical fibers carry pulses
of light to represent data.
Wireless: Network connections can also be established through radio or other
electromagnetic signals. This kind of transmission is called �wireless�. The most
common examples of wireless links include communication satellites, cellular
networks, and radio and technology spread spectrums. Wireless LANs use spectrum
technology to establish connections within a small area.
3. Communication protocols
A communication protocol is a set of rules followed by all nodes involved in the
information transfer. Some common protocols include the internet protocol suite
(TCP/IP), IEEE 802, Ethernet, wireless LAN, and cellular standards. TCP/IP is a
conceptual model that standardizes communication in a modern network. It suggests
four functional layers of these communication links:

Network access layer: This layer defines how the data is physically transferred. It
includes how hardware sends data bits through physical wires or fibers.
Internet layer: This layer is responsible for packaging the data into
understandable packets and allowing it to be sent and received.
Transport layer: This layer enables devices to maintain a conversation by ensuring
the connection is valid and stable.
Application layer: This layer defines how high-level applications can access the
network to initiate data transfer.
Most of the modern internet structure is based on the TCP/IP model, though there
are still strong influences of the similar but seven-layered open systems
interconnection (OSI) model.

IEEE802 is a family of IEEE standards that deals with local area networks (LAN) and
metropolitan area networks (MAN). Wireless LAN is the most well-known member of the
IEEE 802 family and is more widely known as WLAN or Wi-Fis.

4. Network Defense
While nodes, links, and protocols form the foundation of a network, a modern
network cannot exist without its defenses. Security is critical when unprecedented
amounts of data are generated, moved, and processed across networks. A few examples
of network defense tools include firewall, intrusion detection systems (IDS),
intrusion prevention systems (IPS), network access control (NAC), content filters,
proxy servers, anti-DDoS devices, and load balancers.

See More: What Is Local Area Network (LAN)? Definition, Types, Architecture and
Best Practices

Types of Computer Networks


Computer networks can be classified based on several criteria, such as the
transmission medium, the network size, the topology, and organizational intent.
Based on a geographical scale, the different types of networks are:

Nanoscale networks: These networks enable communication between minuscule sensors


and actuators.
Personal area network (PAN): PAN refers to a network used by just one person to
connect multiple devices, such as laptops to scanners, etc.
Local area network (LAN): The local area network connects devices within a limited
geographical area, such as schools, hospitals, or office buildings.
Storage area network (SAN): SAN is a dedicated network that facilitates block-level
data storage. This is used in storage devices such as disk arrays and tape
libraries.
Campus area network (CAN): Campus area networks are a collection of interconnected
LANs. They are used by larger entities such as universities and governments.
Metropolitan area network (MAN): MAN is a large computer network that spans across
a city.
Wide area network (WAN): Wide area networks cover larger areas such as large
cities, states, and even countries.
Enterprise private network (EPN): An enterprise private network is a single network
that a large organization uses to connect its multiple office locations.
Virtual private network (VPN): VPN is an overlay private network stretched on top
of a public network.
Cloud network: Technically, a cloud network is a WAN whose infrastructure is
delivered via cloud services.
Based on organizational intent, networks can be classified as:

Intranet: Intranet is a set of networks that is maintained and controlled by a


single entity. It is generally the most secure type of network, with access to
authorized users alone. An intranet usually exists behind the router in a local
area network.
Internet: The internet (or the internetwork) is a collection of multiple networks
connected by routers and layered by networking software. This is a global system
that connects governments, researchers, corporates, the public, and individual
computer networks.
Extranet: An extranet is similar to the intranet but with connections to particular
external networks. It is generally used to share resources with partners,
customers, or remote employees.
Darknet: The darknet is an overlay network that runs on the internet and can only
be accessed by specialized software. It uses unique, customized communication
protocols.
See More: Wide Area Network (WAN) vs. Local Area Network (LAN): Key Differences and
Similarities

Key Objectives of Creating and Deploying a Computer Network


There is no industry�education, retail, finance, tech, government, or
healthcare�that can survive without well-designed computer networks. The bigger an
organization, the more complex the network becomes. Before taking on the onerous
task of creating and deploying a computer network, here are some key objectives
that must be considered.

Main Components of a Computer Network


Objectives of Deploying a Computer Network

1. Resource sharing
Today�s enterprises are spread across the globe, with critical assets being shared
across departments, geographies, and time zones. Clients are no more bound by
location. A network allows data and hardware to be accessible to every pertinent
user. This also helps with interdepartmental data processing. For example, the
marketing team analyzes customer data and product development cycles to enable
executive decisions at the top level.

2. Resource availability & reliability


A network ensures that resources are not present in inaccessible silos and are
available from multiple points. The high reliability comes from the fact that there
are usually different supply authorities. Important resources must be backed up
across multiple machines to be accessible in case of incidents such as hardware
outages.

3. Performance management
A company�s workload only increases as it grows. When one or more processors are
added to the network, it improves the system�s overall performance and accommodates
this growth. Saving data in well-architected databases can drastically improve
lookup and fetch times.

4.Cost savings
Huge mainframe computers are an expensive investment, and it makes more sense to
add processors at strategic points in the system. This not only improves
performance but also saves money. Since it enables employees to access information
in seconds, networks save operational time, and subsequently, costs. Centralized
network administration also means that fewer investments need to be made for IT
support.

5. Increased storage capacity


Network-attached storage devices are a boon for employees who work with high
volumes of data. For example, every member in the data science team does not need
individual data stores for the huge number of records they crunch. Centralized
repositories get the job done in an even more efficient way. With businesses seeing
record levels of customer data flowing into their systems, the ability to increase
storage capacity is necessary in today�s world.

6. Streamlined collaboration & communication


Networks have a major impact on the day-to-day functioning of a company. Employees
can share files, view each other�s work, sync their calendars, and exchange ideas
more effectively. Every modern enterprise runs on internal messaging systems such
as Slack for the uninhibited flow of information and conversations. However, emails
are still the formal mode of communication with clients, partners, and vendors.

7. Reduction of errors
Networks reduce errors by ensuring that all involved parties acquire information
from a single source, even if they are viewing it from different locations. Backed-
up data provides consistency and continuity. Standard versions of customer and
employee manuals can be made available to a large number of people without much
hassle.

8. Secured remote access


Computer networks promote flexibility, which is important in uncertain times like
now when natural disasters and pandemics are ravaging the world. A secure network
ensures that users have a safe way of accessing and working on sensitive data, even
when they�re away from the company premises. Mobile handheld devices registered to
the network even enable multiple layers of authentication to ensure that no bad
actors can access the system.

See More: What Is Wide Area Network (WAN)? Definition, Types, Architecture, and
Best Practices

Top 10 Best Practices for Computer Network Management in 2022


Network management is the process of configuring, monitoring, and troubleshooting
everything that pertains to a network, be it hardware, software, or connections.
The five functional areas of network management are fault management, configuration
management, performance management, security management, and (user) accounting
management.

Computer networks can quickly become unruly mammoths if not designed and maintained
from the beginning. Here are the top 10 practices for proper computer network
management.

Network-Management-Best-Practices image
Network Management Best Practices

1. Pick the right topology


Network topology is the pattern or hierarchy in which nodes are connected to each
other. The topology can speed up, slow down, or even break the network based on the
company�s infrastructure and requirements. Before setting up a network from
scratch, network architects must choose the right one. Some common topologies
include:

Bus network: Each node is linked to only one other node.


Ring network: Each node is linked to two other nodes, thus forming a ring.
Mesh network: Each node must strive to be connected to every other node in the
system.
Star network: A central node server is linked to multiple other nodes. This is
faster since data doesn�t have to travel through each node.
Tree network: Here, nodes are arranged in hierarchies.
2. Document & update constantly
Documentation of the network is vital since it is the backbone of operations. The
documentation must include:

Technical specifications of equipment, including wires, cables, and connectors


Hardware
The software used to enable the hardware and the smooth and secure flow of data
Firmware
A formal record of policies and procedures with respect to network operators and
users
This must be audited at scheduled intervals or during rehauls. Not only does this
make network management easier, but it also allows for smoother compliance audits.

3. Use the right tools


The network topology is just the first step toward building a robust network. To
manage a highly available and reliant network, the appropriate tools must be placed
at the right locations. Must-have tools in a network are:

Network monitoring solutions: A network monitoring solution gives complete


visibility into the network. Visual maps help gauge network performance. It can
track packets, provide a granular look into network traffic, and help spot
anomalies. Newer monitoring systems leverage artificial intelligence to predict
scaling requirements and cyber threats using historic and real-time data.
Configuration management tools: A network contains many components that interface
with each other. This results in a lot of configuration parameters to keep track
of. Configuration management tools resolve this by providing configuration tools
that span across the entire network. They also allow network managers to ensure
that all compliance requirements have been fulfilled.
IP address managers: Bigger networks need to have an IP address manager (IPAM) to
plan, track, and manage information associated with a network�s IP addresses.
Security solutions: Firewalls, content filtering systems, intrusion detection and
prevention systems�these are all tools that safeguard networks that are carrying
increasingly sensitive loads. No network is complete without them. However, just
acquiring these tools is not enough. They must also be properly placed within the
network. For example, a firewall must be placed at every network junction. Anti-
DDoS devices must be placed at the perimeters of the network. Load balancers need
to be placed at strategic locations based on the infrastructure, such as before a
cluster of database servers. This must be an explicit part of the network
architecture.
4. Establish baseline network & abnormal behavior
A baseline allows admins to know how the network normally behaves in terms of
traffic, user accesses, etc. With an established baseline, alerts can be set up in
appropriate places to flag anomalies immediately. The normal range of behavior must
be documented at both, user and organizational levels. Data required for the
baseline can be acquired from routers, switches, firewalls, wireless APs, sniffers,
and dedicated collectors.

5. Protect the network from insider threats


Firewalls and intrusion prevention systems ensure that bad actors remain out of the
network. However, insider threats need to be addressed as well, particularly with
cybercriminals targeting those with access to the network using various social
engineering ploys. One way of doing this is to operate on a least-privilege model
for access management and control. Another is to use stronger authentication
mechanisms such as single sign-on (SSO) and two-factor authentication (2FA).
Besides this, employees also need to undergo regular training to deal with security
threats. Proper escalation processes must be documented and circulated widely.

6. Use multiple vendors for added security


While it makes sense to stick to one hardware vendor, a diverse range of network
security tools is a major plus for a large network. Security is a dynamic and ever-
involving landscape. Hardware advancements are rapid and cyber threats also evolve
with them. It is impossible for one vendor to be up to date on all threats.
Additionally, different intrusion detection solutions use different detection
algorithms. A good mix of these tools strengthens security; however, you must
ensure that they are compatible and allow for common logging and interfacing.

7. Segregate the network


Enterprise networks can become large and clunky. Segregation allows them to be
divided into logical or functional units, called zones. Segregation is usually done
using switches, routers, and virtual LAN solutions. One advantage of a segregated
network is that it reduces potential damage from a cyberattack and keeps critical
resources out of harm�s way. Another plus is that it allows for more functional
classification of networks, such as separating programmer needs from human
resources needs.
8. Use centralized logging
Centralized logs are key to capturing an overall view of the network. Immediate log
analysis can help the security team flag suspicious logins and IT admin teams to
spot overwhelmed systems in the network.

9. Consider using honeypots & honeynets


Honeypots are separate systems that appear to have legitimate processes and data
but are actually a decoy for insider and outsider threats. Any breach of this
system does not cause the loss of any real data. A honeynet is a fake network
segment for the same cause. While this may come at an additional cost to the
network, it allows the security team to keep an eye out for malicious players and
make appropriate adjustments.

10. Automate wherever possible


New devices are added to systems regularly, and old ones are retired. Users and
access controls keep changing frequently. All of these must be automated to ensure
that human error does not occur and there are no vulnerable zombie systems in the
network, costing money and security. Automation with respect to security is also
crucial. It is a good practice to automate responses to attacks, including blocking
IP addresses, terminating connections, and gathering additional information about
attacks.

You might also like