Updated: 1 July 2024
Networking, or computer networking, is the process of connecting two or more computing devices, such as desktop computers, mobile devices, routers or applications, to enable the transmission and exchange of information and resources.
Networked devices rely on communications protocols—rules that describe how to transmit or exchange data across a network—to share information over physical or wireless connections.
Before contemporary networking practices, engineers would have to physically move computers to share data between devices, which was an unpleasant task at a time when computers were large and unwieldy. To simplify the process (especially for government workers), the Department of Defense funded the creation of the first functioning computer network (eventually named ARPANET) in the late 1960s.
Since then, networking practices—and the computer systems that drive them—have evolved tremendously. Today’s computer networks facilitate large-scale inter-device communication for every business, entertainment and research purpose. The internet, online search, email, audio and video sharing, online commerce, live-streaming and social media all exist because of advancements in computer networking.
Discover how forward-thinking IT leaders are using AI and automation to drive competitiveness with autonomous IT operations.
Before we delve into more complex networking topics, it’s important to understand fundamental networking components, including:
Switches: A switch is a device that connects network devices and manages node-to-node communication across a network, making sure that data packets reach their intended destination. Unlike routers, which send information between networks, switches send information between nodes within a network.
Consequently, “switching” refers to how data is transferred between devices on a network. Networks rely on three main types of switching:
Circuit switching establishes a dedicated data communication path between nodes in a network, so no other traffic can traverse the same path. Circuit switching sees to it that full bandwidth is available during every transmission.
Message switching sends whole messages from the source node to the destination node, with the message traveling from switch to switch until it reaches the destination.
Packet switching involves breaking down data into independent components to make data transmission less demanding of network resources. With packet switching, packets—instead of entire data streams—travel through the network to their end destination.
Typically, computer networks are defined by geographical area. A local area network (LAN) connects computers in a defined physical space, while a wide area network (WAN) can connect computers across continents. However, networks are also defined by the protocols they use to communicate, the physical arrangement of their components, how they manage network traffic and the purpose they serve in their respective environments.
Here, we’ll discuss the most common and widely used computer network types in three broad categories.
The network types in this category are distinguished by the geographical area the network covers.
A LAN connects computers over a relatively short distance, such as those within an office building, school or hospital. LANs are typically privately owned and managed.
As the name implies, a WAN connects computers across large geographical areas, such as regions and continents. WANs often have collective or distributed ownership models for network management purposes. Cloud networks serve as one example, since they’re hosted and delivered by public and private cloud infrastructures across the globe.
A software-defined wide area network (SD-WAN) is a virtualized WAN architecture that uses SDN principles to centralize the management of disconnected WAN networks and optimize network performance.
MANs are larger than LANs but smaller than WANs. Cities and government entities typically own and manage MANs.
A PAN serves one person. If a user has multiple devices from the same manufacturer (an iPhone and a MacBook, for instance), it’s likely they've set up a PAN that shares and syncs content—text messages, emails, photos and more—across devices.
Network nodes can send and receive messages using either wired or wireless links (connections).
Wired network devices are connected by physical wires and cables, including copper wires and Ethernet, twisted pair, coaxial or fiber optic cables. Network size and speed requirements typically dictate the choice of cable, the arrangement of network elements and the physical distance between devices.
Wireless networks forgo cables for infrared, radio or electromagnetic wave transmission across wireless devices with built-in antennae and sensors.
Computing networks can transmit data using a range of transmission dynamics, including:
In a multipoint network, multiple devices share channel capacity and network links.
Network devices establish a direct node-to-node link to transmit data.
On broadcast networks, several interested “parties” (devices) can receive one-way transmissions from a single sending device. Television stations are a great example of broadcast networks.
A VPN is a secure, point-to-point connection between two network endpoints. It establishes an encrypted channel that keeps a user’s identity and access credentials, as well as any data transferred, inaccessible to hackers.
Computer network architecture establishes the theoretical framework of a computer network, including design principles and communications protocols.
Primary types of network architectures
Whereas architecture represents the theoretical framework of a network, topology is the practical implementation of the architectural framework. Network topology describes the physical and logical arrangement of nodes and links on a network, including all hardware (routers, switches, cables), software (apps and operating systems) and transmission media (wired or wireless connections).
Common network topologies include bus, ring, star and mesh.
In a bus network topology, every network node is directly connected to a main cable. In a ring topology, nodes are connected in a loop, so each device has exactly two neighbors. Adjacent pairs are connected directly and nonadjacent pairs are connected indirectly through intermediary nodes. Star network topologies feature a single, central hub through which all nodes are indirectly connected.
Mesh topologies are a bit more complex, defined by overlapping connections between nodes. There are two types of mesh networks—full mesh and partial mesh. In a full mesh topology, every network node connects to every other network node, providing the highest level of network resilience. In a partial mesh topology, only some network nodes connect, typically those that exchange data most frequently.
Full mesh topologies can be expensive and time-consuming to run, which is why they’re often reserved for networks that require high redundancy. Partial mesh, on the other hand, provides less redundancy but is more cost-effective and simpler to run.
Regardless of subtype, mesh networks have self-configuration and self-organization capabilities; they automate the routing process, so the network always finds the fastest, most reliable data path.
Whether it’s the internet protocol (IP) suite, Ethernet, wireless LAN (WLAN) or cellular communication standards, all computer networks follow communication protocols—sets of rules that every node on the network must follow in order to share and receive data. Protocols also rely on gateways to enable incompatible devices to communicate (a Windows computer attempting to access Linux servers, for instance)
Many modern networks run on TCP/IP models, which include four network layers.
Application layer. TCP/IP’s application layer uses HTTP, FTP, Post Office Protocol 3 (POP3), SMTP, domain name system (DNS) and SSH protocols to provide network services directly to applications. It also manages all the protocols that support user applications.
Though TCP/IP is more directly applicable to networking, the Open Systems Interconnection (OSI) model—sometimes called the OSI reference model—has also had a substantial impact on computer networking and computer science, writ broadly.
OSI is a conceptual model that divides network communication into seven abstract layers (instead of four), providing a theoretical underpinning that helps engineers and developers understand the intricacies of network communication. The OSI model's primary value lies in its educational utility and its role as a conceptual framework for designing new protocols, making sure that they can interoperate with existing systems and technologies.
However, the TCP/IP model's practical focus and real-world applicability have made it the backbone of modern networking. Its robust, scalable design and horizontal layering approach has driven the explosive growth of the internet, accommodating billions of devices and massive amounts of data traffic.
Using email as an example, let’s walk through an example of how data moves through a network.
If a user wants to send an email, they first write the email and then press the “send” button. When the user presses “send,” an SMTP or POP3 protocol uses the sender’s wifi to direct the message from the sender node and through the network switches, where it’s compressed and broken down into smaller and smaller segments (and ultimately into bits, or strings of 1s and 0s).
Network gateways direct the bit stream to the recipient’s network, converting data and communication protocols as needed. When the bit stream reaches the recipient’s computer, the same protocols direct the email data through the network switches on the receiver’s network. In the process, the network reconstructs the original message until the email arrives, in human-readable form, in the recipient’s inbox (the receiver node).
Computer networks are inescapable, present in many aspects of modern life. In business, relying on computer networks isn’t an option—they are fundamental to the operation of modern enterprises.
Computer networks provide numerous benefits, including:
Networking enables every form of digital communication, including email, messaging, file sharing, video calls and streaming. Networking connects all the servers, interfaces and transmission media that make business communication possible.
Without networking, organizations would have to store data in individual data repositories, which is unsustainable in the age of big data. Computer networks help teams keep centralized data stores that serve the entire network, freeing up valuable storage capacity for other tasks.
Users, network administrators and developers alike stand to benefit from how networking simplifies resource and knowledge sharing. Networked data is easier to request and fetch, so users and clients get faster responses from network devices. And for those on the business side, networked data makes it easier for teams to collaborate and share information as technologies and enterprises evolve.
Not only are well-built networking solutions more resilient, but they also offer businesses more options for cybersecurity and network security. Most network providers offer built-in encryption protocols and access controls (such as multifactor authentication) to protect sensitive data and keep bad actors off the network.
Modern network infrastructures built for digital transformation require solutions that can be just as dynamic, flexible and scalable as the new environments. IBM® SevOne® provides application-centric network observability to help NetOps spot, address and prevent network performance issues in hybrid environments.
IBM NS1 Connect® provides fast, secure connections to users anywhere in the world with premium DNS and advanced, customizable traffic steering. Always-on, API-first architecture enables your IT teams to more efficiently monitor networks, deploy changes and conduct routine maintenance.
IBM Cloud Pak® for Network Automation is an intelligent cloud platform that enables the automation and orchestration of network operations so CSPs and MSPs can transform their networks, evolve to zero-touch operations, reduce OPEX and deliver services faster.
IBM Hybrid Cloud Mesh, a multicloud networking solution, is a SaaS product designed to enable organizations to establish simple and secure application-centric connectivity across a wide variety of public and private cloud, edge and on-premises environments.
Cloud networking solutions can help your organization implement a secure, highly available global network. Working with an experienced network service provider, you can design and build the unique configuration that enables you to optimize network traffic flow, protect and support applications and meet your specific business needs.
A content delivery network (CDN) is a network of servers that is geographically dispersed to enable faster web performance by locating copies of web content closer to users or facilitating delivery of dynamic content.
Explore the differences between these two approaches to storage and file sharing.
Network monitoring means using network monitoring software to monitor a computer network’s ongoing health and reliability.
NetFlow, a network protocol developed for Cisco routers by Cisco Systems, is widely used to collect metadata about the IP traffic flowing across network devices such as routers, switches and hosts.
Software-defined networking (SDN) is a software-controlled approach to networking architecture driven by application programming interfaces (APIs).
Middleware is software that enables one or more kinds of communication or connectivity between applications or components in a distributed network.