Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Windows 10 End of Service: What Must Be Done

    19 March 2025

    Elementor #7217

    5 March 2025

    Why Windows is Still the Best for Gamers: A Deep Dive

    27 February 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Vimeo
    Let's Tech It Easy
    Subscribe Login
    • Homepage
    • About
    • Blog
      • Computers
      • Cloud
      • Gaming
      • Cyber Security
      • iPhone
      • Mac
      • Windows
      • Android
    • Contact
    • My Tickets
    • Submit Ticket
    Let's Tech It Easy
    Home»Computers»Let’s understand some very basic concepts of Computer Networking
    Computers

    Let’s understand some very basic concepts of Computer Networking

    ReshitaBy Reshita28 April 2021No Comments6 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp VKontakte Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    VIRTUAL NETWORK

    Virtual networks can be thought of as separate networks within a larger network. Administrators can create a separate network segment consisting of a range of subnets (or a single subnet) and control traffic that flows through the cloud network. The main purpose of a virtual network is to enable a data centre or service provider network to provision the most suitable and efficient networking structure for the applications it hosts – and to alter that structure as conditions warrant, using software rather than requiring physical changes in connections to hardware. The ability to virtualize workloads (applications) and to transport them across network infrastructure with minimal service degradation gave rise to the first cloud architectures. With a cloud solution, these virtual networks are known as VNets or Virtual Private Clouds (VPC). These act as a representation of a network in the cloud, giving you a cloud network.

    PROTOCOLS

    In networking, a protocol is a set of rules for formatting and processing data. Network protocols are like a common language for computers. The computers within a network may use vastly different software and hardware; however, the use of protocols enables them to communicate with each other regardless.

    On the Internet, there are different protocols for different types of processes. Protocols are often discussed in terms of which OSI model layer they belong to. The OSI (Open Systems Interconnection) Data Model is an ISO standard for computer networks design and functioning that involves at least 7 layers, each playing a specific role when applications are communicating over the net. During the sending process, each layer (from top to down) will add a specific header to the raw data. At the reception, headers are eliminated conversely until the data arrived to the receiving application.

    SUBNETS

    A subnet or subnetwork is a smaller network inside a large network. Subnetting makes network routing much more efficient. Through subnetting, network traffic can travel a shorter distance without passing through unnecessary routers to reach its destination. Subnets offer a way of organizing your network to help to reduce network congestion. When you have a lot of traffic flowing between particular parts of your network, it can help to group those parts in a single section, so the traffic doesn’t have to travel across the entire network to get from place to place. Separating out small parts of your network into subnets allows traffic to flow more quickly and to avoid taking unnecessary routes, adding traffic where it isn’t needed.

    In addition, subnetting helps in efficiently allocating IP addresses and prevents large numbers of IP addresses from going unused. Subnets are usually set up geographically for particular offices, or for particular teams within a business to allow their network traffic to stay within the location.

    ROUTERS AND ROUTING TABLES

    Routers examine the destination IP address of a received packet and make routing decisions accordingly. To determine which interface the packet will be sent, routers use routing tables. A routing table lists all networks for which routes are known. Each router’s routing table is unique and stored in the RAM of the device. When a router receives a packet that needs to be forwarded to a host on another network, it examines its destination IP address and looks for the routing information stored in the routing table. Each entry in the routing table consists of the network and the subnet mask, the remote router and the outgoing interface. 

    NETWORK SWITCHES

    Switches connect network segments, providing full-duplex communication, valuable network performance data and efficient use of network bandwidth. It is a device that operates at the Data Link layer of the OSI model—Layer 2. It takes in packets being sent by devices that are connected to its physical ports and sends them out again, but only through the ports that lead to the devices the packets are intended to reach. They can also operate at the network layer–Layer 3 where routing occurs.

    When a device sends a packet to another device, it enters the switch and the switch reads its header to determine what to do with it. It matches the destination address or addresses and sends the packet out through the appropriate ports that leads to the destination devices.

    PORTS

    A port is a virtual point where network connections start and end. Ports are software-based and managed by a computer’s operating system. Each port is associated with a specific process or service. Ports allow computers to easily differentiate between different kinds of traffic: emails go to a different port than webpages, for instance, even though both reach a computer over the same Internet connection.

    Ports are standardized across all network-connected devices, with each port assigned a number. Most ports are reserved for certain protocols — for example, all Hypertext Transfer Protocol (HTTP) messages go to port 80. While IP addresses enable messages to go to and from specific devices, port numbers allow targeting of specific services or applications within those devices.

    NETWORK TOPOLOGIES

    Network topology is the way a network is arranged, including the physical or logical description of how links and nodes are set up to relate to each other. There are two approaches to network topology: physical and logical. Physical network topology refers to the physical connections and interconnections between nodes and the network—the wires, cables, and so forth. Logical network topology refers to the conceptual understanding of how and why the network is arranged the way it is, and how data moves through it.

    There are many different ways network nodes can be connected together. Most common topology types are Bus, Ring, Mesh, Star and Hybrid.

    CLIENTS AND SERVERS

    An important relationship on networks is that of the server and the client. A server is a computer that holds content and services such as a website, a media file, or a chat application. A good example of a server is the computer that holds the website for Google’s search page: http://www.google.com. The server holds that page, and sends it out when requested.

    A client is a different computer, such as your laptop or cell phone, that requests to view, download, or use the content. The client can connect over a network to exchange information. For instance, when you request Google’s search page with your web browser, your computer is the client.

    FIREWALL

    A firewall is a network security device that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules. Its purpose is to establish a barrier between your internal network and incoming traffic from external sources (such as the internet) in order to block malicious traffic like viruses and hackers. Firewalls guard traffic at a computer’s entry point, called ports, which is where information is exchanged with external devices. 

    Firewalls can either be software or hardware, though it’s best to have both. A software firewall is a program installed on each computer and regulates traffic through port numbers and applications, while a physical firewall is a piece of equipment installed between your network and gateway.

    basic computer Networking networks
    Share. Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Email
    Previous ArticleWHAT IS .NET FRAMEWORK? EXPLAIN ARCHITECTURE & COMPONENTS.
    Next Article How does Smart Motion detection works on Dahua System
    Reshita

    Related Posts

    Windows 10 End of Service: What Must Be Done

    19 March 2025

    Elementor #7217

    5 March 2025

    Why Windows is Still the Best for Gamers: A Deep Dive

    27 February 2025

    Accessing a Windows External Hard Drive on Mac

    26 February 2025
    Leave A Reply Cancel Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.

    Demo
    Our Picks
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Business

    Windows 10 End of Service: What Must Be Done

    By Uneeb19 March 20250

    On October 14, 2025, Microsoft will officially end support for Windows 10, signalling a major shift…

    Elementor #7217

    5 March 2025

    Why Windows is Still the Best for Gamers: A Deep Dive

    27 February 2025

    Accessing a Windows External Hard Drive on Mac

    26 February 2025

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    You too can join us

    If you also think about technology and want to contribute either as a mentor or even from a learner’s perspective, look no further and join us. Write us at info@letstechiteasy.com and share your opinion. Our team will get back by sending you an invite to join the platform as a contributor. Empower others, empower yourself so each one of us can play with the technology safely one day without being scared.

    Subscribe Here
    Loading
    For Partnership Worldwide

    Contact:

    partner@letstechiteasy.com

     

    About Us
    About Us

    “Let’s Tech It Easy” or popularly known as “LTIE” is the blogging platform for everyone who wants to share and learn about technology. It is an initiative by the serial techpreneur Vish when he realized the wide gap between the pace at which the technology is evolving and at which it is getting adopted by a wider audience.

    Email Us: support@benchmarkitservices.com

    Latest Posts

    Upgrading RAM

    10 March 2023

    Desktop Vs Laptop

    10 March 2023

    Data Recovery

    3 March 2023

    MacOS on Windows Virtual Box

    10 February 2023

    macOS Monterey and what’s new in it?

    12 April 2022
    New Comments
    • How to Troubleshoot Sound and Mic on Windows 10 - Let's Tech It Easy on How to Access Troubleshooters on Windows 10
    • How to Stay Safe While Using Public Wi-Fi Networks - Let's Tech It Easy on Internet Security for Home Users – VPN 101
    • How to Set up Oracle VirtualBox on a Mac - Let's Tech It Easy on How to Install Windows 10 on a Mac Using Boot Camp Assistant
    • DoS Attack Implementation and Prevention in Ubuntu – Let's Tech It Easy on Top Kali Linux Commands
    Facebook X (Twitter) Instagram Pinterest
    • Homepage
    • About
    • Blog
    • Contact
    • Computers
    • Cloud
    • Gaming
    • Cyber Security
    • iPhone
    • Mac
    • Windows
    • My Tickets
    • Submit Ticket
    © 2025 LetsTechitEasy. Designed by Sukrit Infotech.

    Type above and press Enter to search. Press Esc to cancel.

    Sign In or Register

    Welcome Back!

    Login below or Register Now.

    Lost password?

    Register Now!

    Already registered? Login.

    A password will be e-mailed to you.