Home > Articles > Cisco Network Technology > General Networking > Exploring the Modern Computer Network: Types, Functions, and Hardware

Exploring the Modern Computer Network: Types, Functions, and Hardware

  • Sample Chapter is provided courtesy of Cisco Press.
  • Date: Dec 19, 2013.

Chapter Description

This chapter focuses on networking as a primary platform for supporting communication. It describes types of networks, how they are used, and the type of hardware that runs them.

LANs, WANs, and the Internet (1.3)

Most web users never consider how the Internet works. In this section you will begin to explore the pieces that come together to enable network communications.

Components of a Network (1.3.1)

In this section you will begin to learn about the devices and equipment that work together in networks.

Components of the Network (1.3.1.1)

The path that a message takes from source to destination can be as simple as a single cable connecting one computer to another or as complex as a network that literally spans the globe. This network infrastructure is the platform that supports the network. It provides the stable and reliable channel over which our communications can occur.

The network infrastructure contains three categories of network components:

  • End devices
  • Intermediary devices
  • Network media

Devices and media are the physical elements, or hardware, of the network. Hardware comprises the components of the network platform that typically are visible, such as a laptop, PC, switch, router, wireless access point, or the cabling used to connect the devices. Occasionally, some network components may not be visible. In the case of wireless media, for example, messages are transmitted through the air using invisible radio frequency or infrared waves.

Network components are used to provide services and processes. These services and processes are the communication programs, called software, that run on the networked devices. A network service provides information in response to a request. Services include many of the common network applications people use every day, like email hosting services and web hosting services. Processes provide the functionality that directs and moves the messages through the network. Processes are less obvious to us but are critical to the operation of networks.

End Devices (1.3.1.2)

The network devices that people are most familiar with are called end devices, or hosts. These devices form the interface between users and the underlying communication network.

Some examples of end devices are

  • Computers (work stations, laptops, file servers, web servers)
  • Network printers
  • VoIP phones
  • TelePresence endpoints
  • Security cameras
  • Mobile handheld devices (such as smartphones, tablets, PDAs, and wireless debit/credit card readers and barcode scanners)

A host device is either the source or destination of a message transmitted over the network. In order to distinguish one host from another, each host on a network is identified by an address. When a host initiates communication, it uses the address of the destination host to specify where the message should be sent.

In modern networks, a host can act as a client, a server, or both. Software installed on the host determines which role it plays on the network. Servers are hosts that have software installed that enables them to provide information and services, like email or web pages, to other hosts on the network. Clients are hosts that have software installed that enables them to request and display the information obtained from the server.

Intermediary Devices (1.3.1.3)

Intermediary devices interconnect end devices. These devices provide connectivity and work behind the scenes to ensure that data flows across the network. Intermediary devices connect the individual hosts to the network and can connect multiple individual networks to form an internetwork.

Examples of intermediary network devices are

  • Network access devices (switches and wireless access points)
  • Internetworking devices (routers)
  • Security devices (firewalls)

The management of data as it flows through the network is also a role of the intermediary devices. These devices use the destination host address, in conjunction with information about the network interconnections, to determine the path that messages should take through the network.

Processes running on the intermediary network devices perform these functions:

  • Regenerate and retransmit data signals
  • Maintain information about which pathways exist through the network and internetwork
  • Notify other devices of errors and communication failures
  • Direct data along alternate pathways when there is a link failure
  • Classify and direct messages according to QoS priorities
  • Permit or deny the flow of data, based on security settings

Network Media (1.3.1.4)

Communication across a network is carried on a medium. The medium provides the channel over which the message travels from source to destination.

Modern networks primarily use the following three types of media to interconnect devices and to provide the pathway over which data can be transmitted:

  • Metallic wires within cables
  • Glass or plastic fibers (fiber-optic cable)
  • Wireless transmission

Figure 1-12 shows examples of the three types of physical media.

Figure 1-12

Figure 1-12 Network Media

The signal encoding that must occur for the message to be transmitted is different for each media type. On metallic wires, the data is encoded into electrical impulses that match specific patterns. Fiber-optic transmissions rely on pulses of light, within either infrared or visible light ranges. In wireless transmission, patterns of electromagnetic waves depict the various bit values.

Different types of network media have different features and benefits. Not all network media types have the same characteristics or are appropriate for the same purpose. The criteria for choosing network media are

  • The distance the media can successfully carry a signal
  • The environment in which the media is to be installed
  • The amount of data and the speed at which it must be transmitted
  • The cost of the media and installation

Network Representations (1.3.1.5)

When conveying complex information, such as displaying all the devices and media in a large internetwork, it is helpful to use visual representations. A diagram provides an easy way to understand the way the devices in a large network are connected. Such a diagram uses symbols to represent the different devices and connections that make up a network. This type of “picture” of a network is known as a topology diagram.

Like any other language, the language of networking uses a common set of symbols to represent the different end devices, network devices, and media, as shown in Figure 1-13. The ability to recognize the logical representations of the physical networking components is critical to being able to visualize the organization and operation of a network. Throughout this course and its accompanying labs, you will learn both how these devices operate and how to perform basic configuration tasks on these devices.

Figure 1-13

Figure 1-13 Network Representations

In addition to being able to recognize these representations, you need to understand the specialized terminology that is used when discussing how each of these devices and media connect to each other. Important terms to remember are

  • Network interface card (NIC): Provides the physical connection to the network at the PC or other host device. The media connecting the PC to the networking device plugs directly into the NIC (also known as a LAN adapter).
  • Physical port: A connector or outlet on a networking device where the media is connected to a host or other networking device.
  • Interface: Specialized ports on an internetworking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.

Topology Diagrams (1.3.1.6)

Topology diagrams are mandatory for anyone working with a network. A topology diagram provides a visual map of how the network is connected.

There are two types of topology diagrams:

  • Physical topology diagram: Identifies the physical location of intermediary devices, configured ports, and cable installation, as shown on the left in Figure 1-14.
  • Logical topology diagram: Identifies devices, ports, and the IP addressing scheme, as shown on the right in Figure 1-14.

    Figure 1-14

    Figure 1-14 Physical Topology (Left) and Logical Topology (Right)

LANs and WANs (1.3.2)

This section explains how LANs and WANs form computer networks.

Types of Networks (1.3.2.1)

Network infrastructures can vary greatly in terms of

  • Size of the area covered
  • Number of users connected
  • Number and types of services available

Figure 1-15 illustrates the two most common types of network infrastructures:

  • Local-area network (LAN): A network infrastructure that provides access to users and end devices in a small geographical area.
  • Wide-area network (WAN): A network infrastructure that provides access to other networks over a wide geographical area.

    Figure 1-15

    Figure 1-15 LANs Separated by Geographic Distance Connected by a WAN

Other types of networks include

  • Metropolitan-area network (MAN): A network infrastructure that spans a physical area larger than a LAN but smaller than a WAN (e.g., a city). MANs are typically operated by a single entity, such as a large organization.
  • Wireless LAN (WLAN): Similar to a LAN but wirelessly interconnects users and endpoints in a small geographical area.
  • Storage-area network (SAN): A network infrastructure designed to support file servers and provide data storage, retrieval, and replication. It involves high-end servers, multiple disk arrays (called blocks), and Fibre Channel interconnection technology.

Local-Area Networks (1.3.2.2)

LANs are a network infrastructure that spans a small geographical area. Specific features of LANs include

  • LANs interconnect end devices in a limited area such as a home, school, office building, or campus.
  • A LAN is usually administered by a single organization or individual. The administrative control that governs the security and access control policies is enforced on the network level.
  • LANs provide high-speed bandwidth to internal end devices and intermediary devices.

Wide-Area Networks (1.3.2.3)

WANs are a network infrastructure that spans a wide geographical area. WANs are typically managed by service providers (SPs) or Internet service providers (ISPs).

Specific features of WANs include

  • WANs interconnect LANs over wide geographical areas such as between cities, states, provinces, countries, or continents.
  • WANs are usually administered by multiple service providers.
  • WANs typically provide slower-speed links between LANs.

The Internet (1.3.3)

This section explains how the Internet consists of many connected LANs and WANs.

The Internet (1.3.3.1)

Although there are benefits to using a LAN or WAN, most individuals need to communicate with a resource on another network, outside of the local network within the home, campus, or organization. This is done using the Internet.

As shown in Figure 1-16, the Internet is a worldwide collection of interconnected networks (internetworks or the Internet for short), cooperating with each other to exchange information using common standards. Through telephone wires, fiber-optic cables, wireless transmissions, and satellite links, Internet users can exchange information in a variety of forms.

Figure 1-16

Figure 1-16 Internetworks Made Up of LANs and WANs

The Internet is a conglomerate of networks and is not actually owned by any individual or group. Ensuring effective communication across this diverse infrastructure requires the application of consistent and commonly recognized technologies and standards as well as the cooperation of many network administration agencies. There are organizations that have been developed for the purpose of helping to maintain structure and standardization of Internet protocols and processes. These organizations include the Internet Engineering Task Force (IETF), Internet Corporation for Assigned Names and Numbers (ICANN), and the Internet Architecture Board (IAB), plus many others.

Intranet and Extranet (1.3.3.2)

Two other terms are similar to the term Internet:

  • Intranet
  • Extranet

Intranet is a term often used to refer to a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the organization’s members, employees, or others who have authorization. An intranet is basically an internet that is usually only accessible from within the organization.

An organization may publish on its intranet web pages about internal events, health and safety policies, staff newsletters, and staff phone directories. For example, a school may have an intranet that includes class schedule information, online curriculum, and discussion forums. Intranets usually help eliminate paperwork and speed up workflows. An organization’s intranet may be accessible to staff working outside of the organization by using secure connections to the internal network.

An organization may use an extranet to provide secure and safe access to individuals who work for different organizations but require company data. Examples of extranets include

  • A company providing access to outside suppliers/contractors
  • A hospital providing a booking system to doctors so they can make appointments for their patients
  • A local office of education providing budget and personnel information to the schools in its district

Connecting to the Internet (1.3.4)

This section explores the different ways to access the Internet.

Internet Access Technologies (1.3.4.1)

There are many different ways to connect users and organizations to the Internet.

Home users, teleworkers (remote workers), and small offices typically require a connection to an Internet service provider (ISP) to access the Internet. Connection options vary greatly depending on the ISP and the geographical location. However, popular choices include broadband cable, broadband digital subscriber line (DSL), wireless WANs, and mobile services.

Organizations typically require access to other corporate sites and the Internet. Fast connections are required to support business services, including IP phones, video conferencing, and data center storage.

Business-class interconnections are usually provided by service providers (SPs). Popular business-class services include business DSL, leased lines, and Metro Ethernet.

Connecting Remote Users to the Internet (1.3.4.2)

Figure 1-17 illustrates common Internet connection options for small office and home office users, which include

  • Cable: Typically offered by cable television service providers, the Internet data signal is carried on the same coaxial cable that delivers cable television. It provides a high-bandwidth, always-on connection to the Internet. A special cable modem separates the Internet data signal from the other signals carried on the cable and provides an Ethernet connection to a host computer or LAN.
  • DSL: Provides a high-bandwidth, always-on connection to the Internet. It requires a special high-speed modem that separates the DSL signal from the telephone signal and provides an Ethernet connection to a host computer or LAN. DSL runs over a telephone line, with the line split into three channels. One channel is used for voice telephone calls. This channel allows an individual to receive phone calls without disconnecting from the Internet. A second channel is a faster download channel, used to receive information from the Internet. The third channel is used for sending or uploading information. This channel is usually slightly slower than the download channel. The quality and speed of the DSL connection depends mainly on the quality of the phone line and the distance from your phone company’s central office. The farther you are from the central office, the slower the connection.
  • Cellular: Cellular Internet access uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected. The availability of cellular Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all, and for people who are constantly on the go.
  • Satellite: Satellite service is a good option for homes or offices that do not have access to DSL or cable. Satellite dishes require a clear line of sight to the satellite, so satellite service might not be an option in heavily wooded areas or places with other overhead obstructions. Speeds will vary depending on the contract, though they are generally good. Equipment and installation costs can be high (although check the provider for special deals), with a moderate monthly fee thereafter. The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all.
  • Dial-up telephone: An inexpensive option that uses any phone line and a modem. To connect to the ISP, a user calls the ISP access phone number. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling. A modem dial-up connection should only be considered when higher-speed connection options are not available.

    Figure 1-17

    Figure 1-17 Internet Connection Options

Many homes and small offices are more commonly being connected directly with fiber-optic cables. This enables an ISP to provide higher bandwidth speeds and support more services such as Internet, phone, and TV.

The choice of connection varies depending on geographical location and service provider availability.

What are your options for connecting to the Internet?

Connecting Businesses to the Internet (1.3.4.3)

Corporate connection options differ from home-user options. Businesses may require higher bandwidth, dedicated bandwidth, and managed services. Connection options available differ depending on the number of service providers located nearby.

Common connection options for organizations include

  • Dedicated leased line: This is a dedicated connection from the service provider to the customer premises. Leased lines are actually reserved circuits that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate, which tends to make it expensive. In North America, common leased-line circuits include T1 (1.54 Mbps) and T3 (44.7 Mbps), whereas in other parts of the world they are available in E1 (2 Mbps) and E3 (34 Mbps).
  • Metro Ethernet: Metro Ethernet is typically available from a provider to the customer premises over a dedicated copper or fiber connection providing bandwidth speeds of 10 Mbps to 10 Gbps. Ethernet over Copper (EoC) is more economical than fiber-optic Ethernet service in many cases, is quite widely available, and reaches speeds of up to 40 Mbps. However, EoC is limited by distance. Fiber-optic Ethernet service delivers the fastest connections available at an economical price per megabit. Unfortunately, there are still many areas where this service is unavailable.
  • DSL: Business DSL is available in various formats. A popular choice is symmetric DSL (SDSL), which is similar to asymmetric DSL (ADSL) but provides the same upload and download speeds. ADSL is designed to deliver bandwidth at different rates downstream than upstream. For example, a customer getting Internet access may have downstream rates that range from 1.5 to 9 Mbps, whereas upstream bandwidth ranges are from 16 to 640 kbps. ADSL transmissions work at distances up to 18,000 feet (5,488 meters) over a single copper twisted pair.
  • Satellite: Satellite service can provide a connection when a wired solution is not available. Satellite dishes require a clear line of sight to the satellite. Equipment and installation costs can be high, with a moderate monthly fee thereafter. Connections tend to be slower and less reliable than terrestrial competition, which makes satellite less attractive than other alternatives.

The choice of connection varies depending on geographical location and service provider availability.

7. The Expanding Network (1.4) | Next Section Previous Section

Cisco Press Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Cisco Press and its family of brands. I can unsubscribe at any time.

Overview

Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Cisco Press products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information

To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@ciscopress.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information

Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security

Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children

This site is not directed to children under the age of 13.

Marketing

Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information

If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out

Users can always make an informed choice as to whether they should proceed with certain services offered by Cisco Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.ciscopress.com/u.aspx.

Sale of Personal Information

Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents

California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure

Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links

This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact

Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice

We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020