What Makes Up a Network? A network typically includes four things (besides the computers themselves): Protocol: a set of communication rules to make sure that everyone speaks the same language Network interface cards (NICs): cards that plugs into the back (or side) of your computers and lets them send and receive messages from other computers Cable: the medium to connect all of the computers together Router/Hub: hardware to perform traffic control Note: The key word is "typically." Wireless networks obviously don't use cables and NICs aren't necessary for small networks that use parallel/serial ports. Some networks use switches, rather than hubs, to control the network. But the basics still apply.) How Does a Network Work? How does one computer send information to another? It is rather simple. The diagram below shows a simple network: “Visual Networking Overview – A Simple Network”. About.com. Web. New York:New York Times, 2010. September 7, 2010 < http://compnetworking.about.com/od/basicnetworkingconcepts/l/blbasics_networ.htm> If Computer 1 wants to send a file to Computer 2, the following would take place: Based on a protocol that both computers use, the NIC in Computer A translates the file (which consists of binary data -- 1's and 0's) into pulses of electricity. The pulses of electricity pass through the cable with a minimum (hopefully) of resistance. The hub takes in the electric pulses and shoots them out to all of the other cables. Computer B's NIC interprets the pulses and decides if the message is for it or not. In this case, it is, so Computer B's NIC translates the pulses back into the 1's and 0's that make up the file. Sounds easy. However, if anything untoward happens along the way, you have a problem, not a network. So, if Computer A sends the message to the network using NetBEUI, a Microsoft protocol, but Computer B only understands the TCP/ IP protocol, it will not understand the message, no matter how many times Computer A sends it. Computer B also won't get the message if the cable is getting interference from the fluorescent lights, or if the network card has decided not to turn on today, etc. Network Classification Like snowflakes, no two networks are alike. So for the sake of discussion, it helps to classify them by some general characteristics. A given network can be characterized by its: Size: the geographic size of the network Security and access: who can access the network and how access is controlled Protocol: the rules of communication in use on it (for example, TCP/IP, NetBEUI, or AppleTalk) Hardware: the types of physical links and hardware that connect the network Size (LANs and WANs): regarding size, networks are generally lumped into two categories, local area networks (LANs) and wide area networks (WANs) A LAN is primarily defined by geography, and is typically housed in one building or campus. A WAN, on the other hand, is a network that joins many LANs together using super special, highly secret, WAN technologies, but we will delve into that arena some other day. Hopefully you're still reading. Because they are so common, LANs are usually further divided into two major types: Peer-to-peer: A peer-to-peer network doesn't have any dedicated servers or hierarchy among the computers. All of the computers on the network handle security and administration for themselves. The users must make the decisions about who gets access to what. For more information, see article Networking 101: Peer-to-Peer Networks . Client-server: A client-server network works the same way as a peer-to-peer network except that there is at least one computer that is dedicated as a server. The server stores files for sharing, controls access to the printer, and generally acts as the dictator of the network. For more information, see article Networking 101: Client-Server Networks . Protocol As stated above, the protocol of a network is the set of guidelines for inter-computer communication. Two computers with different protocols won't be able to communicate with one another (imagine Ralph Nader and Pat Buchanan in the same room). While many computers have the ability to interpret multiple protocols, it is important to understand the different protocols available before deciding on one that is appropriate for your network. Peer-to-peer (P2P) networking eliminates the need for central servers, allowing all computers to communicate and share resources as equals. Music file sharing, instant messaging and other popular network applications rely on P2P technology. Hardware While some theoretically-minded people would claim that the hardware involved in a network isn't extremely important, they probably haven't ever actually dealt with setting one up. Hardware is important. While in theory, every hub or switch should send and receive signals perfectly, that isn't always the case. And the problem is that if you ask two network administrators what hub they recommend, you will probably get two entirely different, yet passionate answers. From picking the cable (optical fiber, coaxial, or copper), to choosing a server, you should find the most suitable hardware for your needs. How do Wireless Networks work? The key innovation behind wireless networking is that instead of using wires, they exploit radio waves to send data between computers. That's the simple description. However, if you wish to know more details about wireless networks, read on. Ones and Zeros As you surely know, digital data transmission occurs using binary: ones and zeros. This communication method is easily applied to radio waves, as computers are able to send out ones and zeros as different beeps. These beeps are actually so quick that human beings cannot even hear them - as a matter of fact, we are constantly surrounded by radio waves we simply can't hear. This fact, however, doesn't stop a computer from making use of them. Morse Code The principle behind it is similar to the Morse code. As you may know, through this code we can represent the alphabet in such a way that that it will be transmittable through the radio using either a short beep called dot, or a long dash. First used manually, the code became an effective way of sending information around with the development of the telegraph. However, what's even more important is that it is actually a binary system like a computer's ones and zeros. Therefore, wireless networking can be though of as being similar to the Morse code for computers. After plugging a combo radio receiver and transmitter in so the computer is capable of transmitting its equivalent of dots and dashes (in this case, bits) to send your data from here to there. All About Frequencies How can a computer be able to transmit enough bits to send and receive data at such a fast speed? Shouldn't it have a maximum amount of data it can send in a second before it just becomes ineffective? Well, the answer lies in the fact that wireless networking can simply overcome this problem. First, extremely high frequencies are used to send wireless transmissions, so that a lot more data can be transmitted every second. The most commonly used frequency is that of 2.4 gig hertz (2.4 billion cycles per second), almost the same as what mobile phones and microwave ovens use. However, such a high frequency requires a very short wavelength. This is actually the reason why wireless networking can work only within a limited area. Moreover, wireless networks use a technique we call 'frequency hopping'. By using many frequencies in a certain range, they are able to always switch between them. Using more than one frequency allows wireless networks to be more protected against interference caused by other radio signals. Access Points The last step refers to all the computers on a network sharing Internet access made possible by using a particular wireless device called wireless access points . Since access points have radios that can communicate to approximately 100 computers simultaneously and share Internet access between them, these pieces are more expensive than wireless cards for one single computer. Because dedicated wireless access points are necessary mostly for bigger networks, if you have only a few computers, use either one of them as the access point or just buy a wireless router. TCP/IP is arguably the single most important computer networking technology. The Internet and most home networks support TCP/IP as the "language" computers use to find and connect with each other. IP addresses are the fundamental method for computers to identify themselves on most computer networks. Every computer (or other network device) connected to the Internet has an IP address. This address, known as “IP address”, as “IP number”, or merely as “IP” is a code made up of numbers separated by three dots that identifies a particular computer on the Internet. These addresses are actually 32-bit binary numbers, consisting of the two subaddresses (identifiers) mentioned above which, respectively, identify the network and the host to the network, with an imaginary boundary separating the two. An IP address is, as such, generally shown as 4 octets of numbers from 0-255 represented in decimal form instead of binary form. Other Networking Technologies: With VoIP - voice over IP - service, consumers enjoy the convenience of a cell phone with the benefits of full Internet connectivity for telephony. The same Internet Protocol (IP) technology used in conventional data networks can be used to transmit voice and fax. Virtual Private Network The Virtual Private Network - VPN - has attracted the attention of many organizations looking to both expand their networking capabilities and reduce their costs. The VPN can be found in workplaces and homes, where they allow employees to safely log into company networks. Telecommuters and those who travel often find a VPN a more convenient way to stay connected to the corporate intranet. No matter your current involvement with VPNs, this is a good technology to know something about. This VPN tutorial involves many interesting aspects of network protocol design, Internet security, network service outsourcing, and technology standards. What Exactly Is A VPN? A VPN supplies network connectivity over a possibly long physical distance. In this respect, a VPN is a form of Wide Area Network (WAN). The key feature of a VPN, however, is its ability to use public networks like the Internet rather than rely on private leased lines. VPN technologies implement restricted-access networks that utilize the same cabling and routers as a public network, and they do so without sacrificing features or basic security. A VPN supports at least three different modes of use: Remote access client connections LAN-to-LAN internetworking Controlled access within an intranet What is a Firewall? A network firewall guards a computer network against unauthorized incoming messages or undesired outgoing messages. Network firewalls may be hardware devices, software programs, or a combination of the two. Bluetooth Bluetooth wireless technology is a short-range communications technology intended to replace the cables connecting portable and/or fixed devices while maintaining high levels of security. The key features of Bluetooth technology are robustness, low power, and low cost. The Bluetooth specification defines a uniform structure for a wide range of devices to connect and communicate with each other. Bluetooth technology has achieved global acceptance such that any Bluetooth enabled device, almost everywhere in the world, can connect to other Bluetooth enabled devices in proximity. Bluetooth enabled electronic devices connect and communicate wirelessly through short-range, ad hoc networks known as piconets. Each device can simultaneously communicate with up to seven other devices within a single piconet. Each device can also belong to several piconets simultaneously. Piconets are established dynamically and automatically as Bluetooth enabled devices enter and leave radio proximity. A fundamental Bluetooth wireless technology strength is the ability to simultaneously handle both data and voice transmissions. This enables users to enjoy variety of innovative solutions such as a hands-free headset for voice calls, printing and fax capabilities, and synchronizing PDA, laptop, and mobile phone applications to name a few