KEMBAR78
Basics of Computer Networking - GeeksforGeeks | PDF | Computer Network | Domain Name System
0% found this document useful (0 votes)
843 views17 pages

Basics of Computer Networking - GeeksforGeeks

The document provides an overview of computer networking, explaining key concepts such as network types, protocols, and security measures. It covers the basics of how networks function, including terminology like nodes, IP addresses, and DNS, as well as various network topologies and architectures. Additionally, it highlights the importance of networks in modern communication and business operations, emphasizing their role in data sharing, security, and adaptability.

Uploaded by

kemerwaonani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
843 views17 pages

Basics of Computer Networking - GeeksforGeeks

The document provides an overview of computer networking, explaining key concepts such as network types, protocols, and security measures. It covers the basics of how networks function, including terminology like nodes, IP addresses, and DNS, as well as various network topologies and architectures. Additionally, it highlights the importance of networks in modern communication and business operations, emphasizing their role in data sharing, security, and adaptability.

Uploaded by

kemerwaonani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

Aptitude Engineering Mathematics Discrete Mathematics Operating System DBMS Compu

Basics of Computer Networking


Last Updated : 15 Feb, 2025

A computer network is a collection of interconnected devices that share


resources and information. These devices can include computers, servers,
printers, and other hardware. Networks allow for the efficient exchange of
data, enabling various applications such as email, file sharing, and
internet browsing.

Basic Terminologies of Computer Networks


Network: A network is a collection of computers and devices that are
connected together to enable communication and data exchange.

Nodes: Nodes are devices that are connected to a network. These can
include computers, Servers, Printers, Routers, Switches, and other
devices.

Protocol: A protocol is a set of rules and standards that govern how


data is transmitted over a network. Examples of protocols include
TCP/IP, HTTP, and FTP.

Topology: Network topology refers to the physical and logical


arrangement of nodes on a network. The common network topologies
include bus, star, ring, mesh, and tree.

Service Provider Networks: These types of Networks give permission


to take Network Capacity and Functionality on lease from the Provider.
Service Provider Networks include Wireless Communications, Data
Carriers, etc.
Open In App
IP Address: An IP address is a unique numerical identifier that is
assigned to every device on a network. IP addresses are used to
identify devices and enable communication between them.

DNS: The Domain Name System (DNS) is a protocol that is used to


translate human-readable domain names (such as www.google.com)
into IP addresses that computers can understand.

Firewall: A firewall is a security device that is used to monitor and


control incoming and outgoing network traffic. Firewalls are used to
protect networks from unauthorized access and other security threats.

How Does a Computer Network Work?


Basics building blocks of a Computer network are Nodes and Links. A
Network Node can be illustrated as Equipment for Data Communication
like a Modem, Router, etc., or Equipment of a Data Terminal like
connecting two computers or more. Link in Computer Networks can be
defined as wires or cables or free space of wireless networks.

The working of Computer Networks can be simply defined as rules or


protocols which help in sending and receiving data via the links which
allow Computer networks to communicate. Each device has an IP
Address, that helps in identifying a device.

Download Flutter SDK


Flutter

Open In App
What do Computer Networks do?
Computer networks first developed in 1950 for military and defense
purpose. At that time they are mainly used to send data through telephone
lines and had limited use in business or science.

Today computer networks are essential for businesses also. Modern


networks offer more than just connecting devices. They play a key role in
helping businesses adapt to the digital world and succeed. These
networks have become more flexible, automated, and secure, making
them even more important in today’s business environment.

Modern computer networks can:

Work Virtually: The physical network can be divided into smaller virtual
networks. In these virtual networks, devices are connected and can
send data through multiple physical routes. For example, many
business networks use the internet this way.

Connect on a Large Scale: Modern networks link many smaller, spread-


out networks into one big, powerful system. Automation and
monitoring tools help manage and adjust the network as needed,
allowing it to grow or shrink based on demand.

Adapt Quickly: Many networks are controlled by software, so changes


can be made quickly through a digital dashboard. This allows traffic to
be managed easily.

Keep Data Secure: Built-in security features like encryption and access
control protect data. Additional protections like antivirus software,
firewalls, and malware protection can be added to strengthen network
security.

Open In App
Types of Enterprise Computer Networks
LAN: A Local Area Network (LAN) is a network that covers a small
area, such as an office or a home. LANs are typically used to connect
computers and other devices within a building or a campus.

WAN: A Wide Area Network (WAN) is a network that covers a large


geographic area, such as a city, country, or even the entire world. WANs
are used to connect LANs together and are typically used for long-
distance communication.

Cloud Networks: Cloud Networks can be visualized with a Wide Area


Network (WAN) as they can be hosted on public or private cloud
service providers and cloud networks are available if there is a
demand. Cloud Networks consist of Virtual Routers, Firewalls, etc.

These are just a few basic concepts of computer networking. Networking


is a vast and complex field, and there are many more concepts and
technologies involved in building and maintaining networks. Now we are
going to discuss some more concepts on Computer Networking.

Related searches
Online Networking Courses with Certificates Network Management So
Open In App
Open system: A system that is connected to the network and is ready
for communication.
Closed system: A system that is not connected to the network and
can’t be communicated with.

Types of Computer Network Architecture


Computer Network falls under these broad Categories:

Portable WiFi 6 Router


Good Wifi 6 Router Choose

Stay Online With Our Top Travel Routers


—Portable, Secure, And Perfect For Any
Trip.

GL.iNet

OPEN

Client-Server Architecture: Client-Server Architecture is a type of


Computer Network Architecture in which Nodes can be Servers or
Clients. Here, the server node can manage the Client Node Behaviour.

Peer-to-Peer Architecture: In P2P (Peer-to-Peer) Architecture, there is


not any concept of a Central Server. Each device is free for working as
either client or server.

Network Devices
An interconnection of multiple devices, also known as hosts, that are
connected using multiple paths for the purpose of sending/receiving data
or media. Computer networks can also include multiple devices/mediums
which help in the communication between two different devices; these are
known as Network devices and include things such as routers, switches,
hubs, and bridges. Open In App
Network Devices

Network Topology
The Network Topology is the layout arrangement of the different devices
in a network. Some types of network topologies are:

Bus Topology: In bus topology all devices are connected to a single


central cable called a bus. Data is sent along this cable and all devices
share the same connection. Simple and cheap to set up but if the main
cable fails the whole network goes down.

Star Topology: In star topology all devices are connected to a central


node called hub or switch. The hub controls the flow of data between
devices. If one device fails the rest of the network is unaffected. But, if
the central hub fails the whole network stops working.

Ring Topology: In ring topology devices are connected in a circular


loop with each device connected to two others. Data travels in one
direction (or sometimes both) passing through each device until it
reaches its destination. A failure in one device can affect the whole
network.

Mesh Topology: In mesh topology every device is connected to every


other device in the network. It provides multiple paths for data so if one
path fails another can take over.

Open In App
Tree Topology: Tree topology is the combination of star and bus
topology. Tree topology is good for organizing large networks and
allows for easy expansion.

Hybrid Topology: Hybrid topology is the combination of two or more


different topologies (like star and mesh). It is flexible and can be
customized based on the network’s specific needs.

Network Topology

OSI Model
OSI stands for Open Systems Interconnection. It is a reference model that
specifies standards for communications protocols and also the
functionalities of each layer. The OSI has been developed by the
International Organization For Standardization and it is 7 layer
architecture. Each layer of OSI has different functions and each layer has
to follow different protocols. The 7 layers are as follows:

Physical Layer
Data link Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer

Open In App
Network Protocols
A protocol is a set of rules or algorithms which define the way how two
entities can communicate across the network and there exists a different
protocol defined at each layer of the OSI model. A few such protocols are
TCP, IP, UDP, ARP, DHCP, FTP, and so on.

Transmission Control Protocol/Internet Protocol (TCP/IP): TCP/IP is


the foundational protocol suite of the internet, enabling reliable
communication. TCP Ensures data is delivered reliably and in order and
IP routes data packets to their destination based on IP addresses.
Hypertext Transfer Protocol (HTTP) and HTTPS: HTTP and HTTPS
protocols used for transmitting web pages. In HTTP communication is
unsecured and in HTTPS secured communication using SSL/TLS
encryption.
Simple Mail Transfer Protocol (SMTP): SMTP protocol used to send
email. SMTP protocol works with other protocols like POP3 and IMAP
for email retrieval.
File Transfer Protocol (FTP): FTP protocol used for transferring files
between computers. Includes commands for uploading, downloading,
and managing files on a remote server.
Dynamic Host Configuration Protocol (DHCP): DHCP protocol
automatically assigns IP addresses to devices on a network. Reduces
manual configuration and IP address conflicts.
Domain Name System (DNS): DNS Translates human-friendly domain
names into IP addresses. Ensures seamless navigation on the internet.

Unique Identifiers of Network


Hostname: Each device in the network is associated with a unique device
name known as Hostname. Type “hostname” in the command
prompt(Administrator Mode) and press ‘Enter’, this displays the hostname
of your machine.

Open In App
HostName

IP Address (Internet Protocol address): Also known as the Logical


Address, the IP Address is the network address of the system across the
network. To identify each device in the world-wide-web, the Internet
Assigned Numbers Authority (IANA) assigns an IPV4 (Version 4) address
as a unique identifier to each device on the Internet. The length of an IPv4
address is 32 bits, hence, we have 232 IP addresses available. The length
of an IPv6 address is 128 bits.

In Windows Type “ipconfig” in the command prompt and press ‘Enter’, this
gives us the IP address of the device. For Linux, Type “ifconfig” in the
terminal and press ‘Enter’ this gives us the IP address of the device.

MAC Address (Media Access Control address): Also known as physical


address, the MAC Address is the unique identifier of each host and is
associated with its NIC (Network Interface Card). A MAC address is
assigned to the NIC at the time of manufacturing. The length of the MAC
address is: 12-nibble/ 6 bytes/ 48 bits Type “ipconfig/all” in the command
prompt and press ‘Enter’, this gives us the MAC address.

Port: A port can be referred to as a logical channel through which data


Open In App
can be sent/received to an application. Any host may have multiple
applications running, and each of these applications is identified using the
port number on which they are running.

A port number is a 16-bit integer, hence, we have 216 ports available which
are categorized as shown below:

Port Types Range

Well known Ports 0 – 1023

Registered Ports 1024 – 49151

Ephemeral Ports 49152 - 65535

Number of ports: 65,536


Range: 0 – 65535
Type “netstat -a” in the command prompt and press ‘Enter’, this lists all
the ports being used.

List of Ports

Socket: The unique combination of IP address and Port number together


is termed a Socket.

Other Related ConceptsOpen In App


DNS Server: DNS stands for Domain Name System. DNS is basically a
server that translates web addresses or URLs (ex: www.google.com) into
their corresponding IP addresses. We don’t have to remember all the IP
addresses of each and every website. The command ‘nslookup’ gives you
the IP address of the domain you are looking for. This also provides
information on our DNS Server. \

Domain IP Address

ARP: ARP stands for Address Resolution Protocol. It is used to convert


an IP address to its corresponding physical address(i.e., MAC
Address). ARP is used by the Data Link Layer to identify the MAC address
of the Receiver’s machine.

RARP: RARP stands for Reverse Address Resolution Protocol. As the


name suggests, it provides the IP address of the device given a physical
address as input. But RARP has become obsolete since the time DHCP
has come into the picture.

The Domain Name System (DNS) is a critical component of computer


networking. It converts easily recognizable domain names, such as
www.example.com, into numerical IP addresses that computers use to
identify each other on the network.

How DNS Works?


Open In App
DNS works efficiently, translating user-friendly domain names into IP
addresses, allowing seamless navigation on the internet. Below step by
step working of DNS:

User Input: When a user enters a domain name in a browser, the


system needs to find its IP address.
DNS Query: The user's device sends a DNS query to the DNS resolver.
Resolver Request: The DNS resolver checks its cache for the IP
address. If not found, it forwards the request to the root DNS server.
Root DNS Server: The root DNS server provides the address of the TLD
(Top-Level Domain) server for the specific domain extension (e.g.,
.com).
TLD DNS Server: The TLD server directs the resolver to the
authoritative DNS server for the actual domain.
Authoritative DNS Server: The authoritative DNS server knows the IP
address for the domain and provides it to the resolver.
Response to User: The resolver stores the IP address in its cache and
sends it to the user's device.
Access Website: With the IP address, the user's device can access the
desired website.

Network Security
Ensuring the security of a network is crucial to protect data and resources
from unauthorized access and attacks. Key aspects of network security
include:

Firewalls: Devices or software that monitor and control incoming and


outgoing network traffic based on security rules.
Encryption: The process of encoding data to prevent unauthorized
access. Commonly used in VPNs, HTTPS, and secure email.
Intrusion Detection Systems (IDS): Tools that monitor network traffic
for suspicious activity and potential threats.
Access Control: Mechanisms that restrict access to network resources
based on user identity and role.
Open In App
Regular Updates and Patching: Keeping software and hardware up to
date to protect against vulnerabilities.

Why Use Computer Networks?


Computer network play a important role in modern life. Here are some key
benefits of computer networks:

Fast and Easy Communication: Networks enable all types of digital


communication, like emails, messaging, file sharing, video calls, and
streaming.

More Storage Space: Suppose if we don't have a cloud storage then we


have to store data in physical files that will consume a physical space
so computer network provide a storage for storing data.

Easier Sharing of Information: Networks make it simpler for users and


teams to share resources and information. Teams can collaborate
more easily, and users get faster response from network devices.

Better Security: Well designed networks are more reliable and give
businesses more options for keeping data safe. They come with built-in
security features like encryption and access controls to protect
sensitive information from cyber threats.

Conclusion
Understanding the basics of computer networking is essential in today’s
interconnected world. Networks enable the seamless exchange of
information, support countless applications, and underpin the
functionality of the internet. From different types of networks and their
components to protocols and security measures, a solid grasp of these
concepts is foundational for anyone working in or with technology. As
technology evolves, so too will the complexity and capabilities of
computer networks, making continuous learning and adaptation crucial.
Open In App
Advertise with us Next Article

Types of Network Topology

K Kunda… Follow

1.43k

Similar Reads

Basics of Computer Networking


A computer network is a collection of interconnected devices that share resources and information.
These devices can include computers, servers, printers, and other hardware. Networks allow for the…
14 min read

Types of Network Topology


Network topology refers to the arrangement of different elements like nodes, links, or devices in a
computer network. Common types of network topology include bus, star, ring, mesh, and tree…
12 min read

Transmission Modes in Computer Networks (Simplex, Half-Duplex and Full-


Duplex)
Transmission modes also known as communication modes, are methods of transferring data between
devices on buses and networks designed to facilitate communication. They are classified into three…
6 min read

Manchester Encoding in Computer Network


Manchester encoding is a synchronous clock encoding technique used by the physical layer of the
Open System Interconnection to encode the clock and data of a synchronous bit stream. The idea of …
9 min read

Difference between Broadband and Baseband Transmission


In communication systems, Broadband and Baseband refer to two different ways of transmitting data.
They differ in how data is sent over a communication medium, the frequency range they use, and their…
6 min read

Open In App
What is OSI Model? - Layers of OSI Model
The OSI (Open Systems Interconnection) Model is a set of rules that explains how different computer
systems communicate over a network. OSI Model was developed by the International Organization for…
( )
13 min read

TCP/IP Model
The TCP/IP model (Transmission Control Protocol/Internet Protocol) is a four-layer networking
framework that enables reliable communication between devices over interconnected networks. It…
7 min read

Multiple Access Protocols in Computer Network


Multiple Access Protocols are methods used in computer networks to control how data is transmitted
when multiple devices are trying to communicate over the same network. These protocols ensure that…
9 min read

Framing in Data Link Layer


Frames are the units of digital transmission, particularly in computer networks and
telecommunications. Frames are comparable to the packets of energy called photons in the case of…
6 min read

What is Ethernet?
A LAN is a data communication network connecting various terminals or computers within a building
or limited geographical area. The connection between the devices could be wired or wireless. Ethernet…
9 min read

Article Tags : Misc Computer Networks

Practice Tags : Misc

Corporate & Communications


Address:
A-143, 7th Floor, Sovereign Corporate
Tower, Sector- 136, Noida, Uttar
Pradesh (201305)

Registered Address:
K 061, Tower K, Gulshan Vivante
Apartment,Open
SectorIn
137, Noida,
App
Gautam Buddh Nagar, Uttar Pradesh,
201305

Advertise with us

Company Languages
About Us Python
Legal Java
Privacy Policy C++
In Media PHP
Contact Us GoLang
Advertise with us SQL
GFG Corporate Solution R Language
Placement Training Program Android Tutorial
Tutorials Archive

DSA Data Science & ML


Data Structures Data Science With Python
Algorithms Data Science For Beginner
DSA for Beginners Machine Learning
Basic DSA Problems ML Maths
DSA Roadmap Data Visualisation
Top 100 DSA Interview Problems Pandas
DSA Roadmap by Sandeep Jain NumPy
All Cheat Sheets NLP
Deep Learning

Web Technologies Python Tutorial


HTML Python Programming Examples
CSS Python Projects
JavaScript Python Tkinter
TypeScript Python Web Scraping
ReactJS OpenCV Tutorial
NextJS Python Interview Question
Bootstrap Django
Web Design

Computer Science DevOps


Operating Systems Open In App Git
Computer Network Linux
Database Management System AWS
Software Engineering Docker
Digital Logic Design Kubernetes
Engineering Maths Azure
Software Development GCP
Software Testing DevOps Roadmap

System Design Inteview Preparation


High Level Design Competitive Programming
Low Level Design Top DS or Algo for CP
UML Diagrams Company-Wise Recruitment Process
Interview Guide Company-Wise Preparation
Design Patterns Aptitude Preparation
OOAD Puzzles
System Design Bootcamp
Interview Questions

School Subjects GeeksforGeeks Videos


Mathematics DSA
Physics Python
Chemistry Java
Biology C++
Social Science Web Development
English Grammar Data Science
Commerce CS Subjects
World GK

@GeeksforGeeks, Sanchhaya Education Private Limited, All rights reserved

Open In App

You might also like