Black and blue background

A computer network comprises two or more computers that are connected—either by cables (wired) or WiFi (wireless)—with the purpose of transmitting, exchanging, or sharing data and resources. You build a computer network using hardware (e.g., routers, switches, access points, and cables) and software (e.g., operating systems or business applications).

Geographic location often defines a computer network. For example, a LAN (local area network) connects computers in a defined physical space, like an office building, whereas a WAN (wide area network) can connect computers across continents. The internet is the largest example of a WAN, connecting billions of computers worldwide.

You can further define a computer network by the protocols it uses to communicate, the physical arrangement of its components, how it controls traffic, and its purpose.

Computer networks enable communication for every business, entertainment, and research purpose. The internet, online search, email, audio and video sharing, online commerce, live-streaming, and social networks all exist because of computer networks.

As networking needs evolved, so did the computer network types that serve those needs. Here are the most common and widely used computer network types:

LAN (local area network):  A LAN connects computers over a relatively short distance, allowing them to share data, files, and resources. For example, a LAN may connect all the computers in an office building, school, or hospital. Typically, LANs are privately owned and managed.  

WLAN (wireless local area network):  A WLAN is just like a LAN but connections between devices on the network are made wirelessly.  

WAN (wide area network):  As the name implies, a WAN connects computers over a wide area, such as from region to region or even continent to continent. The internet is the largest WAN, connecting billions of computers worldwide. You will typically see collective or distributed ownership models for WAN management.  

MAN (metropolitan area network):  MANs are typically larger than LANs but smaller than WANs. Cities and government entities typically own and manage MANs.  

PAN (personal area network):  A PAN serves one person. For example, if you have an iPhone and a Mac, it’s very likely you’ve set up a PAN that shares and syncs content—text messages, emails, photos, and more—across both devices.  

SAN (storage area network):  A SAN is a specialized network that provides access to block-level storage—shared network or cloud storage that, to the user, looks and works like a storage drive that’s physically attached to a computer. (For more information on how a SAN works with block storage, see Block Storage: A Complete Guide .)  

CAN (campus area network):  A CAN is also known as a corporate area network. A CAN is larger than a LAN but smaller than a WAN. CANs serve sites such as colleges, universities, and business campuses.  

VPN (virtual private network): A VPN is a secure, point-to-point connection between two network end points (see ‘Nodes’ below). A VPN establishes an encrypted channel that keeps a user’s identity and access credentials, as well as any data transferred, inaccessible to hackers.

The following are some common terms to know when discussing computer networking:

IP address : An IP address is a unique number assigned to every device connected to a network that uses the Internet Protocol for communication. Each IP address identifies the device’s host network and the location of the device on the host network. When one device sends data to another, the data includes a ‘header’ that includes the IP address of the sending device and the IP address of the destination device.  

Nodes : A node is a connection point inside a network that can receive, send, create, or store data. Each node requires you to provide some form of identification to receive access, like an IP address. A few examples of nodes include computers, printers, modems, bridges, and switches. A node is essentially any network device that can recognize, process, and transmit information to any other network node.  

Routers : A router is a physical or virtual device that sends information contained in data packets between networks. Routers analyze data within the packets to determine the best way for the information to reach its ultimate destination. Routers forward data packets until they reach their destination node.  

Switches : A switch is a device that connects other devices and manages node-to-node communication within a network, ensuring data packets reach their ultimate destination. While a router sends information between networks, a switch sends information between nodes in a single network. When discussing computer networks, ‘switching’ refers to how data is transferred between devices in a network. The three main types of switching are as follows:

Circuit switching , which establishes a dedicated communication path between nodes in a network. This dedicated path assures the full bandwidth is available during the transmission, meaning no other traffic can travel along that path.  

Packet switching involves breaking down data into independent components called packets which, because of their small size, make fewer demands on the network. The packets travel through the network to their end destination.  

Message switching sends a message in its entirety from the source node, traveling from switch to switch until it reaches its destination node.  

Ports : A port identifies a specific connection between network devices. Each port is identified by a number. If you think of an IP address as comparable to the address of a hotel, then ports are the suites or room numbers within that hotel. Computers use port numbers to determine which application, service, or process should receive specific messages.  

Network cable types : The most common network cable types are Ethernet twisted pair, coaxial, and fiber optic. The choice of cable type depends on the size of the network, the arrangement of network elements, and the physical distance between devices.

The wired or wireless connection of two or more computers for the purpose of sharing data and resources form a computer network. Today, nearly every digital device belongs to a computer network.

In an office setting, you and your colleagues may share access to a printer or to a group messaging system. The computing network that allows this is likely a LAN or local area network that permits your department to share resources.

A city government might manage a city-wide network of surveillance cameras that monitor traffic flow and incidents. This network would be part of a MAN or metropolitan area network that allows city emergency personnel to respond to traffic accidents, advise drivers of alternate travel routes, and even send traffic tickets to drivers who run red lights.

The Weather Company worked to create a peer-to-peer mesh network that allows mobile devices to communicate directly with other mobile devices without requiring WiFi or cellular connectivity. The Mesh Network Alerts  project allows the delivery of life-saving weather information to billions of people, even without an internet connection.

The internet is actually a network of networks that connects billions of digital devices worldwide. Standard protocols allow communication between these devices. Those protocols include hypertext transfer protocol (the ‘http’ in front of all website addresses). Internet protocol (or IP addresses) are the unique identifying numbers required of every device that accesses the internet. IP addresses are comparable to your mailing address, providing unique location information so that information can be delivered correctly.

Internet Service Providers (ISPs) and Network Service Providers (NSPs) provide the infrastructure that allows the transmission of packets of data or information over the internet. Every bit of information sent over the internet doesn’t go to every device connected to the internet. It’s the combination of protocols and infrastructure that tells information exactly where to go.

Computer networks connect nodes like computers, routers, and switches using cables, fiber optics, or wireless signals. These connections allow devices in a network to communicate and share information and resources.

Networks follow protocols, which define how communications are sent and received. These protocols allow devices to communicate. Each device on a network uses an Internet Protocol or IP address, a string of numbers that uniquely identifies a device and allows other devices to recognize it. 

Routers are virtual or physical devices that facilitate communications between different networks. Routers analyze information to determine the best way for data to reach its ultimate destination. Switches connect devices and manage node-to-node communication inside a network, ensuring that bundles of information traveling across the network reach their ultimate destination.

Computer network architecture defines the physical and logical framework of a computer network. It outlines how computers are organized in the network and what tasks are assigned to those computers. Network architecture components include hardware, software, transmission media (wired or wireless), network topology, and communications protocols.

Main types of network architecture

There are two types of network architecture:  peer-to-peer (P2P) and client/server . In P2P architecture, two or more computers are connected as “peers,” meaning they have equal power and privileges on the network. A P2P network does not require a central server for coordination. Instead, each computer on the network acts as both a client (a computer that needs to access a service) and a server (a computer that serves the needs of the client accessing a service). Each peer makes some of its resources available to the network, sharing storage, memory, bandwidth, and processing power.

In a client/server network, a central server or group of servers manage resources and deliver services to client devices in the network. The clients in the network communicate with other clients through the server. Unlike the P2P model, clients in a client/server architecture don’t share their resources. This architecture type is sometimes called a tiered model because it's designed with multiple levels or tiers.

Network topology

Network topology refers to how the nodes and links in a network are arranged. A network node is a device that can send, receive, store, or forward data. A network link connects nodes and may be either cabled or wireless links.

Understanding topology types provides the basis for building a successful network. There are a number of topologies but the most common are bus, ring, star, and mesh:

A bus network topology is when every network node is directly connected to a main cable.  

In a ring topology , nodes are connected in a loop, so each device has exactly two neighbors. Adjacent pairs are connected directly; non-adjacent pairs are connected indirectly through multiple nodes.  

In a star network topology , all nodes are connected to a single, central hub and each node is indirectly connected through that hub.  

A mesh topology is defined by overlapping connections between nodes. You can create a full mesh topology, where every node in the network is connected to every other node. You can also create partial mesh topology in which only some nodes are connected to each other and some are connected to the nodes with which they exchange the most data. Full mesh topology can be expensive and time-consuming to execute, which is why it's often reserved for networks that require high redundancy. Partial mesh provides less redundancy but is more cost effective and simpler to execute.

Computer network security protects the integrity of information contained by a network and controls who access that information. Network security policies balance the need to provide service to users with the need to control access to information.

There are many entry points to a network. These entry points include the hardware and software that comprise the network itself as well as the devices used to access the network, like computers, smartphones, and tablets. Because of these entry points, network security requires using several defense methods. Defenses may include firewalls—devices that monitor network traffic and prevent access to parts of the network based on security rules.

Processes for authenticating users with user IDs and passwords provide another layer of security. Security includes isolating network data so that proprietary or personal information is harder to access than less critical information. Other network security measures include ensuring hardware and software updates and patches are performed regularly, educating network users about their role in security processes, and staying aware of external threats executed by hackers and other malicious actors. Network threats constantly evolve, which makes network security a never-ending process.

The use of public cloud also requires updates to security procedures to ensure continued safety and access. A secure cloud demands a secure underlying network. 

Read about the top five considerations  (PDF, 298 KB) for securing the public cloud.

As noted above, a mesh network is a topology type in which the nodes of a computer network connect to as many other nodes as possible. In this topology, nodes cooperate to efficiently route data to its destination. This topology provides greater fault tolerance because if one node fails, there are many other nodes that can transmit data. Mesh networks self-configure and self-organize, searching for the fastest, most reliable path on which to send information.

Type of mesh networks

There are two types of mesh networks—full mesh and partial mesh: 

Load balancers efficiently distribute tasks, workloads, and network traffic across available servers. Think of load balancers like air traffic control at an airport. The load balancer observes all traffic coming into a network and directs it toward the router or server best equipped to manage it. The objectives of load balancing are to avoid resource overload, optimize available resources, improve response times, and maximize throughput.

For a complete overview of load balancers, see Load Balancing: A Complete Guide .

A content delivery network (CDN) is a distributed server network that delivers temporarily stored, or cached, copies of website content to users based on the user’s geographic location. A CDN stores this content in distributed locations and serves it to users as a way to reduce the distance between your website visitors and your website server. Having cached content closer to your end users allows you to serve content faster and helps websites better reach a global audience. CDNs protect against traffic surges, reduce latency, decrease bandwidth consumption, accelerate load times, and lessen the impact of hacks and attacks by introducing a layer between the end user and your website infrastructure.

Live-streaming media, on-demand media, gaming companies, application creators, e-commerce sites—as digital consumption increases, more content owners turn to CDNs to better serve content consumers.

Related solutions

Ibm® content delivery network.

Avoid network traffic jams and decrease latency by keeping your data closer to your users with Akamai’s content delivery network on IBM Cloud®.

IBM Cloud® Load Balancer

IBM Cloud® Load Balancers enable you to balance traffic among servers to improve uptime and performance.

IBM Cloud® network security

Gain more control of your cloud infrastructure and protect your servers and network.

Learn how load balancing optimizes website and application performance.

An introduction to content delivery networks and how they improve customer satisfaction by optimizing website and mobile app performance.

Answers to pressing questions from IT architects on public cloud security.

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

Enter the email address you signed up with and we'll email you a reset link.

paper cover thumbnail

[Networking Assignment]

Profile image of Prasad Vasudewan

Now that computing has become an integral part of life and business data communication (sending and receiving data) over long distances is a necessity.

Related Papers

sasongko.noneto.com

Dodi Cahyono

computer networking assignment pdf

Aland Muhammed

Carlos Pinto

Muthu Selvam

kalani jayawardana

Mancharagopan Ponnampalam

HARISH BHATIA

Malik Micheal

Stephen N G O N G A Bwalya , Stephen Bwalya

Wired computer networks offer a more secure and faster way of connectivity but need of accessibility and mobility i.e. anywhere, any location, access to wired networks is driving most users to the technology of wireless networks. Wireless computer networks are a more flexible system to implement as an alternate to the wired networks .This project is based on the performance analysis of wired and wireless computer networks and will be implemented and simulated using Opnet 9.1 modeller. For wired computer networks (Ethernet), metrics like traffic received, delay, throughput will be analysed while for wireless networks (802.11), traffic received, mac delay, and throughput will be analysed. Keyword: Ethernet, 802.11, Opnet, throughput, delay, and traffic received

Zeynel Misirli

Loading Preview

Sorry, preview is currently unavailable. You can download the paper by clicking the button above.

RELATED PAPERS

awanish kumar

Sri Computer , RAJNISH KUMAR SHUKLA KAFARA

YOGESH KUMBHALKAR

francisco jair cortes perez

virendra thoke

Feleke Anmut

Odhiambo Thomas

Yahya Yaqobi

Adewale Ademola

CCNA MNC STRUCTURE

Mayank pandey

Aroso Emmanuel Adedeji

Aroso A . Emmanuel

RELATED TOPICS

Interactive resources you can assign in your digital classroom from TPT.

computer networking assignment pdf

Easel Activities

computer networking assignment pdf

Easel Assessments

Unlock access to 4 million resources — at no cost to you — with a school-funded subscription..

computer networking

All Formats

Resource types, all resource types, results for computer networking.

Computer networks bundle

Computer networks bundle

The IT teacher from Bulgaria

Computer Lab decorations - Alphabet

Ally Smith - Sweet Magnolia Teaching

Computer Networks

Tech 4 All

Computer Login Cards Editable

Computer Login Cards Editable

OkinawanGirl

Inside The Computer A Build & Learn Activity (Digital & Print) Computer Hardware

Computer Creations

Also included in:  Middle School Computer Science and Technology Curriculum - Beginner Skills

Computer Networks, Connections and Protocols Workbook

Computer Networks, Connections and Protocols Workbook

Nichola Wilkin

Also included in:  Computer Science Workbooks

Tech Jobs ( Job Search ) Careers Lesson Activity

Tech Jobs ( Job Search ) Careers Lesson Activity

Gavin Middleton

Computer Systems and Networks Bundle for Key Stage 3

ROBBOT RESOURCES

Computer Science: Networks & Network Security for KS3

Also included in:  Computer Systems and Networks Bundle for Key Stage 3

Introduction to Computer Networking -  Slide Presentation

Introduction to Computer Networking - Slide Presentation

Tobin Shields

Crash Course Computer Science #26-30 (Graphics, Networks, Internet)

Karen Maxson

Also included in:  Crash Course Computer Science COMPLETE SERIES - 40 Episode Guides

I Have Who Has?  Technology and Computer Vocabulary Game

I Have Who Has? Technology and Computer Vocabulary Game

Mrs Os Tech Lab

Network Hardware - Introduction to Networking - Computer Science - Full lesson

Taylormade Teaching Resources

AP Computer Science Principles - Unit 3 - The Internet

Goldie's Math Emporium

Also included in:  AP® Computer Science Principles Curriculum Bundle

Computer Science Principles Bundle: Big Idea 4 - Computer Systems & Networks

Computer Science Principles Bundle: Big Idea 4 - Computer Systems & Networks

Innovative Mathematics

Computer Posters - Multicolor

La-Nette Mark

Also included in:  Computer Resources Bundle

AP CSP | 50 Q&A | Computer Systems and Networks | High School

AP CSP | 50 Q&A | Computer Systems and Networks | High School

Computer Programming Resources

Also included in:  AP CSP Test Prep Bundle for High School

Sound Waves - Lesson Presentations, Lab Experiment, Computer Activity, Videos

Sound Waves - Lesson Presentations, Lab Experiment, Computer Activity, Videos

jts23

Lower KS2 Computer Systems and Networks - Lesson Bundle!

TandLGuru

Computer Networking Quiz

Buzzing Around with Miss B

Introduction to Networking - What is a Network?- Computer Science - Full lesson

Electromagnetic Spectrum - Lesson Presentation, Computer Activity, Assign...

Electromagnetic Spectrum - Lesson Presentation, Computer Activity, Assign...

Computer Networking Game

Computer Networking Game

School Technologies

Designing your own app. A computer science activity. Intro to computer science.

Jody Weissler's Teachtopia Network

TPT empowers educators to teach at their best.

Keep in Touch!

Are you getting the free resources, updates, and special offers we send out every week in our teacher newsletter?

dBooks

Computer Networks

A systems approach.

by Larry Peterson, Bruce Davie

Computer Networks

Subscribe to new books via dBooks.org telegram channel

Book description.

This open book is licensed under a Creative Commons License (CC BY). You can download Computer Networks ebook for free in PDF format (21.9 MB).

Table of Contents

Book details.

CC BY

Related Books

An Introduction to Computer Networks

Browse Course Material

How does the global network infrastructure work and what are the design principles on which it is based? In what ways are these design principles compromised in practice? How do we make it work better in today’s world? How do we ensure that it will work well in the future in the face of rapidly growing scale and heterogeneity? And how should Internet applications be written, so they can obtain the best possible performance both for themselves and for others using the infrastructure? These are some issues that are grappled with in this course. The course will focus on the design, implementation, analysis, and evaluation of large-scale networked systems.

Topics include internetworking philosophies, unicast and multicast routing, congestion control, network quality of service, mobile networking, router architectures, network-aware applications, content dissemination systems, network security, and performance issues. Material for the course will be drawn from research papers, industry white papers, and Internet RFCs.

A diagram of a simulation of a computer network.

Unit 11 Computer Networks Assignment 2 2

Uploaded by, document information, original title, available formats, share this document, share or embed document, sharing options.

Did you find this document useful?

Is this content inappropriate, original title:, reward your curiosity.

computer networking assignment pdf

IMAGES

  1. The essentials to write a computer networking assignment

    computer networking assignment pdf

  2. Networking online assignment

    computer networking assignment pdf

  3. Computer Network Assignments Made Easy Through BookyMyEssay Writing Service

    computer networking assignment pdf

  4. Computer Network Assignment

    computer networking assignment pdf

  5. Computer Network Assignment Help & Writing Services in Australia

    computer networking assignment pdf

  6. Assignment on Computer Basics Book PDF Download

    computer networking assignment pdf

VIDEO

  1. Computer Network Lecture 5

  2. Computer networks introduction

  3. Day 1 Network Basics: Computer Networking Class

  4. Introduction Computer Network II

  5. computer network assignment 1

  6. Introduction

COMMENTS

  1. PDF Networking Fundamentals

    Network Data Link Physical The Seven Layers of the OSI Model (Cont.) Data Delivery: • Provides connectivity and path selection between two host systems • Routes data packets • Selects best path to deliver data • The Network layer prioritizes data known as Quality of Service (QoS)

  2. PDF An Introduction to Computer Networks

    An Introduction to Computer Networks

  3. PDF Introduction to Computer Networking

    1.1. Basic of Networking A computer network consists of a collection of computers, printers and other equipment that is connected together so that they can communicate with each other. Fig 1 gives an example of a network in a school comprising of a local area network or LAN connecting computers with each other, the internet, and various servers.

  4. The Fundamentals of Networking

    Computer network architecture defines the physical and logical framework of a computer network. It outlines how computers are organized in the network and what tasks are assigned to those computers. Network architecture components include hardware, software, transmission media (wired or wireless), network topology, and communications protocols.

  5. Networking Assignment

    A computer network is a system for communicating between two or more computers and associated devices. It is an interconnection of computers for the purposes of sharing information and resources. or A network is a set of devices (often referred to as nodes) connected by communication links. A node can be a computer, printer, or any other device

  6. Unit 2 Networking-Assignment

    The major purpose of this assignment is to provide the students an opportunity to exhibit their knowledge in the field of computer networking, how the network operates, protocols, standards, security considerations, and the prototypes associated with a range of networking technologies.

  7. Computer Networks Assignment 1.pdf

    1. Network hardware can be classified by its location and role in the network: Core Core network components interconnect other network components. Gateway: an interface providing a compatibility between networks by converting transmission speeds, protocols, codes, or security measures. Router: a networking device that forwards data packets between computer networks.

  8. Networking Assignment.pdf

    Networking Assignment.pdf - Networking Assignment (15 Points) 1. What is the IP address and TCP port number used by the client computer (source) that is | Course Hero Networking Assignment.pdf - Networking Assignment (15... Doc Preview Pages 2 Total views 19 George Mason University IT Introduction To Computing bpk2754 11/04/2020

  9. (PDF) Computer Network Chapter (7) Network Layer: IP Address assignment

    PDF | Chapter 7 Network Layer: IP Address assignment & Routing | Find, read and cite all the research you need on ResearchGate

  10. Networking Assignment

    Networking Assignment - MINNATHUL HIQMA WAZEER UNIT:02 ASSIGNMENT NO: 01 BATCH NO: 079 NETWORKING - Studocu Networking Assignment networking minnathul hiqma wazeer batch no: 079 unit:02 assignment no:01 higher nationals internal verification of assessment decisions Skip to document Ask an Expert Sign inRegister Sign inRegister Home Ask an ExpertNew

  11. (DOC) [Networking Assignment]

    For wired computer networks (Ethernet), metrics like traffic received, delay, throughput will be analysed while for wireless networks (802.11), traffic received, mac delay, and throughput will be analysed. Keyword: Ethernet, 802.11, Opnet, throughput, delay, and traffic received Download Free PDF View PDF Physical topologies in computer networks

  12. IT3104-Computer Networks Assignment

    IT3104-Computer Networks Assignment -2 - Read online for free. Scribd is the world's largest social reading and publishing site. IT3104-Computer Networks Assignment - 2. Uploaded by kartikay. 0 ratings 0% found this document useful (0 votes) 0 views. 3 pages. Document Information

  13. Assignments

    Computer Networks. Menu. More Info Syllabus Calendar Readings Lecture Notes Assignments ... (PDF - 1.2 MB) Problem Set 2 AQM.tcl cwnd1.awk dtq.awk LFN.tcl loss.awk redq.awk ... assignment_turned_in Problem Sets with Solutions. Download Course.

  14. CCNA.pdf

    Briefly describe the article. The summary is used in search results to help users find relevant articles. You can improve the accuracy of search results by including phrases that your customers use to describe this issue or topic.

  15. PDF Course Inform ation

    Com puter Networking 1 of 14 . Course Inform ation. Course Pre -req uisites . CS 2134 (CS2134 Data Structures and Algorithms) or equivalent . Knowledge of binary addition and multiplication system. Course Descrip tion This course takes a top-down approach to computer networking. After an overview of computer networks and the Internet, the ...

  16. Computer Networking Teaching Resources

    Computer Networks. by. Tech 4 All. $15.00. Zip. Internet Activities. This is a comprehensive Computer Networks unit that gives an overview of many areas of this huge topic. It's a 4—6 week unit depending on student skill level and is designed for middle level students.

  17. Computer Networks, 6th Edition.pdf

    Computer Networks: A Systems Approach, Sixth Edition, explores the key principles of computer networking, using real world examples from network and protocol design. Using the Internet as the primary example, this best-selling classic textbook explains various protocols and networking technologies. The systems-oriented approach encourages ...

  18. (PDF) INTRODUCTION TO NETWORKING

    Basically, network consists of hardware component such as computer, hubs, switches, routers and other devices which form the network infrastructure. These are the devices that play an...

  19. Computer Networks

    notes Lecture Notes. assignment_turned_in Problem Sets with Solutions. Simulation of a computer network, in 10 iterations, with 2.0 ms steps. The red represents the new recalculated step, and the green is the trace from the previous step. (Image from Tutorial 2 , by Hari Balakrishnan.) Download Course.

  20. Unit 11 Computer Networks Assignment 2 2

    A firewall is a network security device that monitors incoming and outgoing traffic. that decides whether to allow or block certain traffic based off security rules. Email is a software that allows users to send and receive messages over a. computer network and does not need the user to be online when it has been sent.

  21. (PDF) Networking Fundamentals

    Abstract. This is a great starting point for learners who are interested in entry-level networking concepts and skills. This path is vendor-neutral and covers networking concepts and protocols ...