What is a Network? — Definition and Fundamentals
1. Definition
A computer network is a collection of two or more computing devices — such as computers, servers, printers, smartphones, and routers — interconnected via communication links and governed by protocols so they can share resources, exchange data, and communicate with each other.
At its simplest, two laptops connected by a cable and sharing a file form a network. At its most complex, the Internet is a global network of billions of devices spanning every country on Earth.
What Makes a Network?
| Requirement | Detail |
|---|---|
| Two or more devices | Any device that can send or receive data — called a node or host |
| A communication medium | Physical (Ethernet cable, fibre optic) or wireless (Wi-Fi, Bluetooth, cellular) |
| Protocols | Agreed rules that define how data is formatted, addressed, transmitted, and received |
In an office, five computers connect to a central switch via Ethernet cables. They share files and a printer — forming a simple Local Area Network (LAN). Add a router to that switch and all five computers can now reach the Internet too.
Related pages: Types of Networks | VLANs/LAN | WAN |
2. Core Components of a Network
Every network — from a home Wi-Fi setup to a global enterprise — is built from the same four fundamental building blocks.
| Category | Examples | Role in the Network |
|---|---|---|
| End Devices (Hosts) | Computers, servers, laptops, printers, smartphones, IoT sensors | Generate, receive, or store data — the source and destination of all network communication |
| Networking Devices | Switches, routers, hubs, access points, firewalls, modems | Forward, filter, and manage traffic between devices and networks |
| Transmission Media (Links) | Ethernet (UTP/STP), fibre optic, coaxial, Wi-Fi, Bluetooth, cellular | The physical or wireless channel that carries data between devices |
| Protocols | TCP/IP, HTTP, FTP, DHCP, DNS, OSPF, SMTP | Rules governing how data is formatted, addressed, routed, and received |
Key Networking Devices — Roles at a Glance
| Device | OSI Layer | Primary Role |
|---|---|---|
| Hub | Layer 1 (Physical) | Broadcasts all traffic to every port — creates a single collision domain; largely obsolete |
| Switch | Layer 2 (Data Link) | Forwards frames to the correct port using the MAC address table; separates collision domains; backbone of every LAN |
| Router | Layer 3 (Network) | Connects different networks; forwards packets based on IP addresses and a routing table; provides Internet access |
| Access Point (AP) | Layer 2 | Bridges wireless clients to the wired LAN; provides Wi-Fi coverage |
| Firewall | Layer 3–7 | Inspects and filters traffic based on rules; enforces security policy at network boundaries |
| Modem | Layer 1 | Modulates/demodulates signals for the ISP connection (DSL, cable, fibre) |
Related pages: Switch | Router | Firewall/ACL | Access Points & WLC | Fibre vs Copper
3. Types of Networks by Geographic Scope
Networks are commonly classified by the geographic area they cover. Each type has typical speeds, technologies, and use cases.
| Type | Full Name | Typical Scope | Example |
|---|---|---|---|
| PAN | Personal Area Network | 1–10 metres (around a person) | Bluetooth headset connected to a smartphone; USB between a PC and printer |
| LAN | Local Area Network | Single building or campus | Office Ethernet network; home Wi-Fi; school computer lab |
| MAN | Metropolitan Area Network | City or large campus | City-wide ISP fibre network; university campus connecting multiple buildings |
| WAN | Wide Area Network | Countries or global | The Internet; corporate MPLS network connecting branch offices across countries |
Scale from smallest to largest:
PAN ──── LAN ──────────────── MAN ──────────────────────────── WAN
(1–10m) (building / campus) (city / metro) (global)
Bluetooth Ethernet / Wi-Fi Fibre metro ring MPLS / Internet
Related pages: VLANs/LAN | MAN | WAN | Types of Networks — Full Guide
4. Types of Data Transmitted Over a Network
Modern networks carry four categories of traffic. Each has different bandwidth, latency, and reliability requirements — which is why Quality of Service (QoS) exists to prioritise time-sensitive traffic like voice and video.
| Data Type | Examples | Key Network Requirement |
|---|---|---|
| Data | Text files, spreadsheets, emails, web pages, code | Reliability over speed — can tolerate some delay |
| Voice (VoIP) | Phone calls over IP, Cisco Unified Communications | Low latency (<150 ms), low jitter — very delay-sensitive |
| Video | Zoom, Microsoft Teams, Netflix, CCTV streams | High bandwidth + low latency — most demanding traffic type |
| Multimedia | Combined audio/video (e.g. a Teams call with screen share) | Combination of voice and video requirements |
During a Zoom call, your computer simultaneously transmits voice (microphone audio) and video (webcam feed) while receiving the same from other participants — all over the same IP network, prioritised by QoS rules on the router.
Related pages: QoS Overview | QoS Marking |
5. Network Architecture Models
Architecture describes how control and resources are organised across the network. The two most important models for CCNA are Client-Server and Peer-to-Peer.
| Model | How It Works | Advantages | Disadvantages | Example |
|---|---|---|---|---|
| Client-Server | Dedicated servers provide resources; clients request them | Centralised control, security, backups; scales well | Server is single point of failure; expensive infrastructure | Workstations accessing a file server; web browser and web server |
| Peer-to-Peer (P2P) | All devices are equal — any device acts as both client and server | Simple, inexpensive, no dedicated server needed | Poor scalability; decentralised security; harder to manage | Two laptops sharing files; BitTorrent; home printer sharing |
| Centralised | All processing and data managed by one central system | Easiest to manage and secure; consistent policy everywhere | Total dependency on central system — failure affects everyone | Traditional mainframe; cloud SaaS like Salesforce |
| Decentralised / Distributed | Control and data distributed across many nodes | Highly resilient — no single point of failure | Complex to manage; harder to enforce consistent security policy | The Internet itself; blockchain; CDN edge networks |
6. Physical and Logical Topology
Physical topology describes how devices are physically cabled and connected. Logical topology describes how data actually flows through the network — which may differ from the physical layout.
| Topology | Type | Description | Advantage | Disadvantage |
|---|---|---|---|---|
| Star | Physical | All devices connect to a central switch or hub | Easy to add/remove devices; one cable failure only affects that device | Central switch is a single point of failure |
| Bus | Physical (legacy) | All devices share a single common cable | Simple and inexpensive for very small networks | One break in the bus brings down the entire network |
| Ring | Physical / Logical | Each device connects to exactly two others, forming a loop | Predictable data flow; no collisions in token-ring implementations | One failure can break the entire ring |
| Mesh | Physical | Every device connects to every other (full mesh) or multiple paths (partial mesh) | Highest redundancy — multiple paths for every traffic flow | Expensive and complex to cable at scale |
| Hybrid | Physical | Combination of two or more topologies (e.g. star-bus, star-mesh) | Flexible — real-world enterprise networks always use this | More complex design and troubleshooting |
Star topology (most common in modern LANs):
PC-1 PC-2
\ /
\ /
[Switch]
/ \
/ \
PC-3 Printer
All devices run dedicated cables to the central switch.
A single cable failure affects only that one device.
An office uses a star physical topology — all devices cable into a central switch. Logically, traffic flows device → switch → device using MAC addresses. The logical data path is different from the physical star shape.
Related pages: Ethernet Standards | Structured Cabling | OSI Layer Functions
7. Network Protocols
A protocol is a standardised set of rules that governs how two devices communicate — covering the format of messages, how they are addressed, sequenced, and acknowledged. Without protocols, a Windows PC and a Linux server could not exchange a single byte.
| Protocol | OSI Layer | Port(s) | Purpose |
|---|---|---|---|
| TCP/IP | 3 + 4 | — | Core suite of the Internet; IP provides addressing and routing; TCP provides reliable ordered delivery |
| HTTP / HTTPS | 7 | 80 / 443 | Web browsing; HTTPS adds TLS encryption for secure sessions |
| DNS | 7 | 53 | Resolves human-readable domain names (netstuts.com) to IP addresses |
| DHCP | 7 | 67/68 UDP | Automatically assigns IP address, subnet mask, default gateway, and DNS to hosts |
| FTP | 7 | 20/21 | File transfers; plaintext — use SFTP or FTPS for security |
| SMTP | 7 | 25 | Sends email between mail servers |
| ICMP | 3 | — | Error reporting and diagnostics — used by ping and traceroute |
| OSPF | 3 | IP 89 | Link-state routing protocol — exchanges topology information between routers to build routing tables |
1. DNS (port 53) resolves the hostname to an IP address.
2. TCP (Layer 4) establishes a reliable connection to port 443.
3. TLS / HTTPS encrypts the session.
4. HTTP (Layer 7) requests the web page content.
5. IP (Layer 3) routes every packet from your device to the server and back.
Related pages: Common Port Numbers | How DNS Works | How DHCP Works | HTTP & HTTPS | OSI vs TCP/IP
8. Purpose and Benefits of Networking
| Benefit | What It Means | Real-World Example |
|---|---|---|
| Resource Sharing | Share printers, storage, software licences, and internet connections | Twenty employees share one high-speed printer instead of each having their own |
| Communication & Collaboration | Email, instant messaging, video conferencing, VoIP | A global team holds a video call via Microsoft Teams across three continents |
| Centralised Management | Apply patches, backups, and security policies from one location | IT team pushes a security update to all 500 workstations overnight without visiting each desk |
| Cost Efficiency | Shared resources reduce per-device hardware costs | SaaS applications hosted in the cloud eliminate the need for expensive on-premises servers |
| Scalability | Add devices and users without rebuilding the network | New employee joins — plug their laptop into the switch and they instantly have full network access |
| Flexibility & Mobility | Access data and applications from anywhere on the network | A salesperson accesses the CRM database from a hotel room via VPN |
| Centralised Security | Firewalls, IDS/IPS, and access controls enforced at the network level | A firewall blocks all inbound connections except HTTPS — protecting every device behind it simultaneously |
Related pages: Firewall/ACL | IPsec VPN | Troubleshooting Methodology
9. Network Boundaries and Scope
| Boundary | Description | Example |
|---|---|---|
| Internal Network | Devices and resources entirely within a company, home, or organisation — not directly reachable from the Internet | Company intranet; office LAN sitting behind a firewall |
| External Network | Networks outside your organisation — typically the public Internet or a partner's network | The Internet; a supplier's extranet accessed via VPN |
| DMZ (Demilitarised Zone) | A buffer zone between internal and external networks hosting publicly accessible servers, protected by firewalls on both sides | Web server and email server in the DMZ — reachable from the Internet but isolated from the internal LAN |
Internet ──[Outer Firewall]── DMZ (Web server / Mail server)
|
[Inner Firewall]── Internal LAN (PCs / File servers / DB servers)
Related pages: Firewall/ACL | Zone-Based Firewall Lab | NAT Overview | Private vs Public IP
10. Evolution of Networks
| Era | Milestone | Impact |
|---|---|---|
| 1960s | ARPANET — first packet-switched network | Proved that packet switching worked; laid the foundation for the Internet |
| 1970s–1980s | TCP/IP standardised (1983); Ethernet invented | Common language for all network devices; Ethernet dominates LAN technology |
| 1990s | World Wide Web; client-server LANs become mainstream | PC networking in every business; the Internet becomes a public resource |
| 2000s | Wi-Fi (802.11), broadband Internet, VoIP | Wireless networks replace many wired deployments; voice moves to IP |
| 2010s–Now | Cloud computing, SDN, IoT, 5G | Always-on, everywhere connectivity; networks become software-defined and programmable |
Related pages: WAN Technologies | Controller-Based Networking (SDN) | Wi-Fi 802.11 Standards
11. Key Points Summary
| Topic | Key Facts for CCNA |
|---|---|
| Network definition | Two or more devices + communication medium + protocols = a network |
| Switch vs Router | Switch = Layer 2, MAC addresses, connects devices in a LAN. Router = Layer 3, IP addresses, connects different networks. |
| Client-Server vs P2P | Client-server has dedicated servers; P2P devices are equal — any device can be both client and server |
| Physical vs Logical topology | Physical = how it is cabled. Logical = how data flows. A star physical topology is most common in modern LANs. |
| LAN / MAN / WAN / PAN | Classified by geographic scope: PAN (personal) → LAN (building) → MAN (city) → WAN (global) |
| Protocol purpose | Define rules for communication — without them no two different devices could exchange data |
| DMZ | Buffer zone between Internet and internal LAN — hosts public servers while protecting internal resources |
A small business has 10 computers, a shared printer, a file server, and Wi-Fi for mobile devices.
— Computers and printer → switch (Layer 2 LAN)
— Switch → router (Layer 3, connects LAN to Internet)
— Router → integrated AP (Wi-Fi for phones and tablets)
— File server → shared storage (client-server model)
This is a classic real-world network combining a LAN, router, Wi-Fi, and client-server architecture.