What is a Network? — Definition and Fundamentals

1. Definition

A computer network is a collection of two or more computing devices — such as computers, servers, printers, smartphones, and routers — interconnected via communication links and governed by protocols so they can share resources, exchange data, and communicate with each other.

At its simplest, two laptops connected by a cable and sharing a file form a network. At its most complex, the Internet is a global network of billions of devices spanning every country on Earth.

What Makes a Network?

RequirementDetail
Two or more devicesAny device that can send or receive data — called a node or host
A communication mediumPhysical (Ethernet cable, fibre optic) or wireless (Wi-Fi, Bluetooth, cellular)
ProtocolsAgreed rules that define how data is formatted, addressed, transmitted, and received
Example:
In an office, five computers connect to a central switch via Ethernet cables. They share files and a printer — forming a simple Local Area Network (LAN). Add a router to that switch and all five computers can now reach the Internet too.

Related pages: Types of Networks | VLANs/LAN | WAN |

2. Core Components of a Network

Every network — from a home Wi-Fi setup to a global enterprise — is built from the same four fundamental building blocks.

Category Examples Role in the Network
End Devices (Hosts) Computers, servers, laptops, printers, smartphones, IoT sensors Generate, receive, or store data — the source and destination of all network communication
Networking Devices Switches, routers, hubs, access points, firewalls, modems Forward, filter, and manage traffic between devices and networks
Transmission Media (Links) Ethernet (UTP/STP), fibre optic, coaxial, Wi-Fi, Bluetooth, cellular The physical or wireless channel that carries data between devices
Protocols TCP/IP, HTTP, FTP, DHCP, DNS, OSPF, SMTP Rules governing how data is formatted, addressed, routed, and received

Key Networking Devices — Roles at a Glance

DeviceOSI LayerPrimary Role
HubLayer 1 (Physical)Broadcasts all traffic to every port — creates a single collision domain; largely obsolete
SwitchLayer 2 (Data Link)Forwards frames to the correct port using the MAC address table; separates collision domains; backbone of every LAN
RouterLayer 3 (Network)Connects different networks; forwards packets based on IP addresses and a routing table; provides Internet access
Access Point (AP)Layer 2Bridges wireless clients to the wired LAN; provides Wi-Fi coverage
FirewallLayer 3–7Inspects and filters traffic based on rules; enforces security policy at network boundaries
ModemLayer 1Modulates/demodulates signals for the ISP connection (DSL, cable, fibre)

Related pages: Switch | Router | Firewall/ACL | Access Points & WLC | Fibre vs Copper

3. Types of Networks by Geographic Scope

Networks are commonly classified by the geographic area they cover. Each type has typical speeds, technologies, and use cases.

Type Full Name Typical Scope Example
PAN Personal Area Network 1–10 metres (around a person) Bluetooth headset connected to a smartphone; USB between a PC and printer
LAN Local Area Network Single building or campus Office Ethernet network; home Wi-Fi; school computer lab
MAN Metropolitan Area Network City or large campus City-wide ISP fibre network; university campus connecting multiple buildings
WAN Wide Area Network Countries or global The Internet; corporate MPLS network connecting branch offices across countries
  Scale from smallest to largest:

  PAN ──── LAN ──────────────── MAN ──────────────────────────── WAN
  (1–10m)  (building / campus)   (city / metro)                   (global)
  Bluetooth  Ethernet / Wi-Fi     Fibre metro ring                  MPLS / Internet
            

Related pages: VLANs/LAN | MAN | WAN | Types of Networks — Full Guide

4. Types of Data Transmitted Over a Network

Modern networks carry four categories of traffic. Each has different bandwidth, latency, and reliability requirements — which is why Quality of Service (QoS) exists to prioritise time-sensitive traffic like voice and video.

Data TypeExamplesKey Network Requirement
DataText files, spreadsheets, emails, web pages, codeReliability over speed — can tolerate some delay
Voice (VoIP)Phone calls over IP, Cisco Unified CommunicationsLow latency (<150 ms), low jitter — very delay-sensitive
VideoZoom, Microsoft Teams, Netflix, CCTV streamsHigh bandwidth + low latency — most demanding traffic type
MultimediaCombined audio/video (e.g. a Teams call with screen share)Combination of voice and video requirements
Example:
During a Zoom call, your computer simultaneously transmits voice (microphone audio) and video (webcam feed) while receiving the same from other participants — all over the same IP network, prioritised by QoS rules on the router.

Related pages: QoS Overview | QoS Marking |

5. Network Architecture Models

Architecture describes how control and resources are organised across the network. The two most important models for CCNA are Client-Server and Peer-to-Peer.

Model How It Works Advantages Disadvantages Example
Client-Server Dedicated servers provide resources; clients request them Centralised control, security, backups; scales well Server is single point of failure; expensive infrastructure Workstations accessing a file server; web browser and web server
Peer-to-Peer (P2P) All devices are equal — any device acts as both client and server Simple, inexpensive, no dedicated server needed Poor scalability; decentralised security; harder to manage Two laptops sharing files; BitTorrent; home printer sharing
Centralised All processing and data managed by one central system Easiest to manage and secure; consistent policy everywhere Total dependency on central system — failure affects everyone Traditional mainframe; cloud SaaS like Salesforce
Decentralised / Distributed Control and data distributed across many nodes Highly resilient — no single point of failure Complex to manage; harder to enforce consistent security policy The Internet itself; blockchain; CDN edge networks
CCNA exam tip: Know the key difference — in a client-server model the server is a dedicated device that only serves. In a peer-to-peer model every device is equal and can be both client and server at the same time.

6. Physical and Logical Topology

Physical topology describes how devices are physically cabled and connected. Logical topology describes how data actually flows through the network — which may differ from the physical layout.

TopologyTypeDescriptionAdvantageDisadvantage
Star Physical All devices connect to a central switch or hub Easy to add/remove devices; one cable failure only affects that device Central switch is a single point of failure
Bus Physical (legacy) All devices share a single common cable Simple and inexpensive for very small networks One break in the bus brings down the entire network
Ring Physical / Logical Each device connects to exactly two others, forming a loop Predictable data flow; no collisions in token-ring implementations One failure can break the entire ring
Mesh Physical Every device connects to every other (full mesh) or multiple paths (partial mesh) Highest redundancy — multiple paths for every traffic flow Expensive and complex to cable at scale
Hybrid Physical Combination of two or more topologies (e.g. star-bus, star-mesh) Flexible — real-world enterprise networks always use this More complex design and troubleshooting
  Star topology (most common in modern LANs):

        PC-1           PC-2
          \             /
           \           /
         [Switch]
           /           \
          /             \
        PC-3          Printer

  All devices run dedicated cables to the central switch.
  A single cable failure affects only that one device.
            
Physical vs Logical example:
An office uses a star physical topology — all devices cable into a central switch. Logically, traffic flows device → switch → device using MAC addresses. The logical data path is different from the physical star shape.

Related pages: Ethernet Standards | Structured Cabling | OSI Layer Functions

7. Network Protocols

A protocol is a standardised set of rules that governs how two devices communicate — covering the format of messages, how they are addressed, sequenced, and acknowledged. Without protocols, a Windows PC and a Linux server could not exchange a single byte.

ProtocolOSI LayerPort(s)Purpose
TCP/IP3 + 4Core suite of the Internet; IP provides addressing and routing; TCP provides reliable ordered delivery
HTTP / HTTPS780 / 443Web browsing; HTTPS adds TLS encryption for secure sessions
DNS753Resolves human-readable domain names (netstuts.com) to IP addresses
DHCP767/68 UDPAutomatically assigns IP address, subnet mask, default gateway, and DNS to hosts
FTP720/21File transfers; plaintext — use SFTP or FTPS for security
SMTP725Sends email between mail servers
ICMP3Error reporting and diagnostics — used by ping and traceroute
OSPF3IP 89Link-state routing protocol — exchanges topology information between routers to build routing tables
What happens when you visit https://netstuts.com:
1. DNS (port 53) resolves the hostname to an IP address.
2. TCP (Layer 4) establishes a reliable connection to port 443.
3. TLS / HTTPS encrypts the session.
4. HTTP (Layer 7) requests the web page content.
5. IP (Layer 3) routes every packet from your device to the server and back.

Related pages: Common Port Numbers | How DNS Works | How DHCP Works | HTTP & HTTPS | OSI vs TCP/IP

8. Purpose and Benefits of Networking

BenefitWhat It MeansReal-World Example
Resource Sharing Share printers, storage, software licences, and internet connections Twenty employees share one high-speed printer instead of each having their own
Communication & Collaboration Email, instant messaging, video conferencing, VoIP A global team holds a video call via Microsoft Teams across three continents
Centralised Management Apply patches, backups, and security policies from one location IT team pushes a security update to all 500 workstations overnight without visiting each desk
Cost Efficiency Shared resources reduce per-device hardware costs SaaS applications hosted in the cloud eliminate the need for expensive on-premises servers
Scalability Add devices and users without rebuilding the network New employee joins — plug their laptop into the switch and they instantly have full network access
Flexibility & Mobility Access data and applications from anywhere on the network A salesperson accesses the CRM database from a hotel room via VPN
Centralised Security Firewalls, IDS/IPS, and access controls enforced at the network level A firewall blocks all inbound connections except HTTPS — protecting every device behind it simultaneously

Related pages: Firewall/ACL | IPsec VPN | Troubleshooting Methodology

9. Network Boundaries and Scope

BoundaryDescriptionExample
Internal Network Devices and resources entirely within a company, home, or organisation — not directly reachable from the Internet Company intranet; office LAN sitting behind a firewall
External Network Networks outside your organisation — typically the public Internet or a partner's network The Internet; a supplier's extranet accessed via VPN
DMZ (Demilitarised Zone) A buffer zone between internal and external networks hosting publicly accessible servers, protected by firewalls on both sides Web server and email server in the DMZ — reachable from the Internet but isolated from the internal LAN
  Internet ──[Outer Firewall]── DMZ (Web server / Mail server)
                     |
            [Inner Firewall]── Internal LAN (PCs / File servers / DB servers)
            
Key point: The DMZ adds a second layer of protection. Even if an attacker compromises a public-facing server in the DMZ, they still face the inner firewall before reaching sensitive internal systems like databases and HR records.

Related pages: Firewall/ACL | Zone-Based Firewall Lab | NAT Overview | Private vs Public IP

10. Evolution of Networks

EraMilestoneImpact
1960s ARPANET — first packet-switched network Proved that packet switching worked; laid the foundation for the Internet
1970s–1980s TCP/IP standardised (1983); Ethernet invented Common language for all network devices; Ethernet dominates LAN technology
1990s World Wide Web; client-server LANs become mainstream PC networking in every business; the Internet becomes a public resource
2000s Wi-Fi (802.11), broadband Internet, VoIP Wireless networks replace many wired deployments; voice moves to IP
2010s–Now Cloud computing, SDN, IoT, 5G Always-on, everywhere connectivity; networks become software-defined and programmable

Related pages: WAN Technologies | Controller-Based Networking (SDN) | Wi-Fi 802.11 Standards

11. Key Points Summary

TopicKey Facts for CCNA
Network definitionTwo or more devices + communication medium + protocols = a network
Switch vs RouterSwitch = Layer 2, MAC addresses, connects devices in a LAN. Router = Layer 3, IP addresses, connects different networks.
Client-Server vs P2PClient-server has dedicated servers; P2P devices are equal — any device can be both client and server
Physical vs Logical topologyPhysical = how it is cabled. Logical = how data flows. A star physical topology is most common in modern LANs.
LAN / MAN / WAN / PANClassified by geographic scope: PAN (personal) → LAN (building) → MAN (city) → WAN (global)
Protocol purposeDefine rules for communication — without them no two different devices could exchange data
DMZBuffer zone between Internet and internal LAN — hosts public servers while protecting internal resources
Practical Scenario:
A small business has 10 computers, a shared printer, a file server, and Wi-Fi for mobile devices.
— Computers and printer → switch (Layer 2 LAN)
— Switch → router (Layer 3, connects LAN to Internet)
— Router → integrated AP (Wi-Fi for phones and tablets)
— File server → shared storage (client-server model)
This is a classic real-world network combining a LAN, router, Wi-Fi, and client-server architecture.

Practice Quiz – What is a Network?

1. What is the basic definition of a computer network?

Correct answer is C. A network requires at least two devices, a communication medium (wired or wireless), and protocols to govern how data is exchanged. A single device alone — even one connected to the Internet — is using a network but does not constitute one by itself. The definition always involves multiple nodes communicating according to agreed rules.

2. Which device is the foundation of a wired LAN and connects devices using MAC address forwarding?

Correct answer is A. A switch operates at OSI Layer 2 (Data Link). It learns the MAC address of each connected device and builds a MAC address table, then forwards frames only to the port where the destination MAC address resides — unlike a hub which broadcasts to all ports. The switch is the central device in virtually every modern wired LAN, providing dedicated bandwidth to each device and eliminating collisions.

3. What is the primary function of a router that makes it different from a switch?

Correct answer is D. A router operates at OSI Layer 3 (Network). Its job is to connect separate networks — for example, your office LAN to the Internet — and route packets between them using IP addresses and a routing table. A switch (Layer 2) only connects devices within the same LAN using MAC addresses and cannot route between different networks. This Layer 2 vs Layer 3 distinction is a fundamental CCNA concept.

4. Which protocol suite is the foundation of the Internet and virtually all modern IP networks?

Correct answer is B. TCP/IP is not a single protocol but a suite — a family of related protocols. IP (Layer 3) handles logical addressing and routing between networks; TCP (Layer 4) provides reliable, connection-oriented, sequenced delivery. Together they form the universal language of the Internet. FTP, SMTP, and HTTP are application-layer protocols that all depend on TCP/IP to carry their data.

5. What is the key difference between the Client-Server and Peer-to-Peer (P2P) network models?

Correct answer is C. In a client-server model, dedicated servers exist solely to provide services (file storage, authentication, email) while clients request those services. In a peer-to-peer (P2P) model there are no dedicated servers — every device is equal and can simultaneously provide resources to some devices while requesting them from others. P2P is simple for small setups; client-server is more scalable and manageable for larger networks.

6. Which physical topology is most commonly used in modern wired LANs, and why?

Correct answer is A. The star topology dominates modern Ethernet LANs. Every device has its own dedicated cable run to a central switch. A cable break or device failure only affects that one device — all others keep working. It is also easy to add new devices and easy to isolate faults. Bus topology is legacy (10BASE-2 coax), ring is largely obsolete for LANs, and full mesh is used for WAN core or data-centre spine links — not desktop LANs.

7. What is the primary purpose of network protocols?

Correct answer is B. Without protocols, a Windows PC and a Linux server would have no way to understand each other — like two people speaking completely different languages. Protocols define every detail of communication: message format, addressing, sequencing, error detection, and session management. IP addressing assignment (C) is done by DHCP — which is itself a specific protocol, not the general definition of what protocols do.

8. Which of the following is NOT a genuine benefit of networking?

Correct answer is D. Networking provides many genuine benefits — resource sharing, centralised management, flexibility, and improved security posture. However, it cannot guarantee the elimination of all hardware failures or network errors. Networks introduce their own failure modes: cable breaks, switch faults, routing loops, and packet loss. Designing for redundancy (HSRP, EtherChannel, dual ISP links) reduces the impact of failures but can never eliminate them entirely.

9. What is a DMZ in the context of network security boundaries, and why is it used?

Correct answer is C. A DMZ (Demilitarised Zone) sits between the untrusted Internet and the trusted internal LAN, protected by firewalls on both sides. Publicly accessible servers — web servers, email servers, DNS — are placed in the DMZ so external users can reach them. Even if an attacker compromises a DMZ server, they still face the internal firewall before reaching sensitive internal systems. This two-layer design is a fundamental network security best practice.

10. In a peer-to-peer (P2P) network model, how do devices operate compared to a client-server model?

Correct answer is B. In a peer-to-peer (P2P) model, every device is equal — any device can simultaneously share its own resources while requesting resources from others. There is no dedicated server. This makes P2P simple and cheap for small environments (two laptops sharing files) but difficult to manage and secure at scale. The client-server model uses dedicated servers — devices that exist solely to provide services — which scales better and is easier to administer centrally.

← Back to Home