searchnetworking.techtarget.com
206.19.49.153 

URL: https://searchnetworking.techtarget.com/definition/network
Submission: On January 24 via manual from US

Form analysis 3 forms found in the DOM

GET https://www.techtarget.com/search/query

<form action="https://www.techtarget.com/search/query" method="get" class="header-search" style="width: 790px;">
  <label for="header-search-input" class="visuallyhidden">Search the TechTarget Network</label>
  <input class="header-search-input ui-autocomplete-input" id="header-search-input" autocomplete="off" type="text" name="q" placeholder="Search the TechTarget Network">
  <button class="header-search-submit"><i class="icon" data-icon="g"></i></button>
</form>

<form id="loggedoutCommentsForm" class="comments-form logged-out">
  <div class="cleditorMain" style="width: 100%; height: 200px;">
    <div class="cleditorToolbar" style="height: 27px;">
      <div class="cleditorGroup" style="width: 73px;">
        <div class="cleditorButton cleditorDisabled" title="Bold" disabled="disabled"></div>
        <div class="cleditorButton cleditorDisabled" title="Italic" disabled="disabled" style="background-position: -24px center;"></div>
        <div class="cleditorButton cleditorDisabled" title="Strikethrough" disabled="disabled" style="background-position: -72px center;"></div>
        <div class="cleditorDivider"></div>
      </div>
      <div class="cleditorGroup" style="width: 73px;">
        <div class="cleditorButton cleditorDisabled" title="Font" disabled="disabled" style="background-position: -144px center;"></div>
        <div class="cleditorButton cleditorDisabled" title="Font Size" disabled="disabled" style="background-position: -168px center;"></div>
        <div class="cleditorButton cleditorDisabled" title="Style" disabled="disabled" style="background-position: -192px center;"></div>
        <div class="cleditorDivider"></div>
      </div>
      <div class="cleditorGroup" style="width: 49px;">
        <div class="cleditorButton cleditorDisabled" title="Font Color" disabled="disabled" style="background-position: -216px center;"></div>
        <div class="cleditorButton cleditorDisabled" title="Remove Formatting" disabled="disabled" style="background-position: -264px center;"></div>
        <div class="cleditorDivider"></div>
      </div>
      <div class="cleditorGroup" style="width: 49px;">
        <div class="cleditorButton cleditorDisabled" title="Bullets" disabled="disabled" style="background-position: -288px center;"></div>
        <div class="cleditorButton cleditorDisabled" title="Numbering" disabled="disabled" style="background-position: -312px center;"></div>
        <div class="cleditorDivider"></div>
      </div>
      <div class="cleditorGroup" style="width: 25px;">
        <div class="cleditorButton cleditorDisabled" title="Insert Hyperlink" disabled="disabled" style="background-position: -576px center;"></div>
        <div class="cleditorDivider"></div>
      </div>
      <div class="cleditorGroup" style="width: 25px;">
        <div class="cleditorButton ttCleditorButton cleditorDisabled" title="Code" disabled="disabled"></div>
        <div class="cleditorDivider"></div>
      </div>
    </div>
    <textarea id="loggedoutCommentBody" class="comments-form-textarea" placeholder="Share your comment" style="border: none; margin: 0px; padding: 0px; display: none; width: 736px; height: 173px;"></textarea>
    <iframe frameborder="0" src="javascript:true;" style="width: 736px; height: 173px;"></iframe>
  </div>
  <fieldset class="notifications">
    <input data-field="" id="notifications" name="notifications" checked="checked" type="checkbox"> Send me notifications when other members comment.</fieldset>
  <button type="submit" class="comments-form-btn submit" href="#comments-reg-login">Add My Comment</button>
  <div style="display:none;">
    <div id="comments-reg-login">
      <section id="commenting-registration">
        <div class="modal-register">
          <h4>Register</h4>
          <input class="comments-username" type="text" placeholder="Username">
          <input class="comments-email" type="text" placeholder="email@techtarget.com">
          <input class="comments-password" type="password" placeholder="Password">
          <ul class="optInCheckboxesWrapper">
            <li class="optInCheckboxes">
              <fieldset class="checkboxList">
                <ul class="default-list">
                  <li>
                    <input type="checkbox" id="comments-optin-privacy" name="comments-optin-privacy" value="true" data-required="true">
                    <label for="comments-optin-privacy"> I agree to TechTarget&#x2019;s <a href="https://www.techtarget.com/terms-of-use/" target="_blank">Terms of Use</a>, <a href="https://www.techtarget.com/privacy-policy-may25/" target="_blank">Privacy Policy</a>, and the transfer of
                      my information to the United States for processing to provide me with relevant information as described in our Privacy Policy.</label>
                  </li>
                </ul>
              </fieldset>
              <div class="signupErrors">
                <p id="comments-optin-privacy-error" class="sign-up-error-msg hidden">Please check the box if you want to proceed.</p>
              </div>
            </li>
            <li class="optInCheckboxes">
              <fieldset class="checkboxList">
                <ul class="default-list">
                  <li>
                    <input type="checkbox" id="comments-optin-partners" name="comments-optin-partners" value="true" data-required="true">
                    <label for="comments-optin-partners"> I agree to my information being processed by TechTarget and its <a href="https://www.techtarget.com/privacy-partners/" target="_blank">Partners</a> to contact me via phone, email, or other means regarding information relevant to my
                      professional interests. I may unsubscribe at any time.</label>
                  </li>
                </ul>
              </fieldset>
              <div class="signupErrors">
                <p id="comments-optin-partners-error" class="sign-up-error-msg hidden">Please check the box if you want to proceed.</p>
              </div>
            </li>
          </ul>
          <input id="submit-register" class="comments-form-btn" type="submit" value="Add My Comment"> </div>
        <div class="modal-divider"></div>
        <div class="modal-login">
          <h4>Login</h4>
          <input class="comments-email" type="text" placeholder="email@techtarget.com">
          <input class="comments-password" type="password" placeholder="Password"> <a class="forgot-password" href="#forgotPasswordModal">Forgot your password?</a>
          <input id="submit-login" class="comments-form-btn" type="submit" value="Add My Comment">
          <div style="display:none;">
            <div id="forgotPasswordModal">
              <section id="commenting-forgot-password">
                <div id="forgotPasswordModalHeader">
                  <h4>Forgot your password?</h4>
                  <div id="forgotPasswordModalMessaging">
                    <span class="forgotPasswordModalIntro">No problem! Submit your e-mail address below. We&apos;ll send you an email containing your password.</span>
                  </div>
                </div>
                <input id="forgotPasswordModalFormMessage" name="email" tabindex="1" class="required" placeholder="email@techtarget.com">
                <button type="submit" id="forgotPasswordModalFormSubmit" class="button primaryButton">Submit</button>
              </section>
            </div>
          </div>
          <div style="display:none;">
            <div id="forgotPasswordModalConfirm">
              <div id="forgotPasswordModalHeader">
                <h4>Your password has been sent to:
                  <span class="email"></span>
                </h4>
              </div>
            </div>
          </div>
        </div>
      </section>
    </div>
  </div>
</form>

<form class="comments-reply-form">
  <div class="cleditorMain" style="width: 100%; height: 200px;">
    <div class="cleditorToolbar" style="height: 27px;">
      <div class="cleditorGroup" style="width: 73px;">
        <div class="cleditorButton cleditorDisabled" title="Bold" disabled="disabled"></div>
        <div class="cleditorButton cleditorDisabled" title="Italic" disabled="disabled" style="background-position: -24px center;"></div>
        <div class="cleditorButton cleditorDisabled" title="Strikethrough" disabled="disabled" style="background-position: -72px center;"></div>
        <div class="cleditorDivider"></div>
      </div>
      <div class="cleditorGroup" style="width: 73px;">
        <div class="cleditorButton cleditorDisabled" title="Font" disabled="disabled" style="background-position: -144px center;"></div>
        <div class="cleditorButton cleditorDisabled" title="Font Size" disabled="disabled" style="background-position: -168px center;"></div>
        <div class="cleditorButton cleditorDisabled" title="Style" disabled="disabled" style="background-position: -192px center;"></div>
        <div class="cleditorDivider"></div>
      </div>
      <div class="cleditorGroup" style="width: 49px;">
        <div class="cleditorButton cleditorDisabled" title="Font Color" disabled="disabled" style="background-position: -216px center;"></div>
        <div class="cleditorButton cleditorDisabled" title="Remove Formatting" disabled="disabled" style="background-position: -264px center;"></div>
        <div class="cleditorDivider"></div>
      </div>
      <div class="cleditorGroup" style="width: 49px;">
        <div class="cleditorButton cleditorDisabled" title="Bullets" disabled="disabled" style="background-position: -288px center;"></div>
        <div class="cleditorButton cleditorDisabled" title="Numbering" disabled="disabled" style="background-position: -312px center;"></div>
        <div class="cleditorDivider"></div>
      </div>
      <div class="cleditorGroup" style="width: 25px;">
        <div class="cleditorButton cleditorDisabled" title="Insert Hyperlink" disabled="disabled" style="background-position: -576px center;"></div>
        <div class="cleditorDivider"></div>
      </div>
      <div class="cleditorGroup" style="width: 25px;">
        <div class="cleditorButton ttCleditorButton cleditorDisabled" title="Code" disabled="disabled"></div>
        <div class="cleditorDivider"></div>
      </div>
    </div>
    <textarea class="comments-form-textarea" placeholder="Share your comment" style="border: none; margin: 0px; padding: 0px; display: none; width: 100px; height: 173px;"></textarea>
    <iframe frameborder="0" src="javascript:true;" style="width: 100px; height: 173px;"></iframe>
  </div>
  <button type="submit" class="comments-form-btn submit" href="#comments-reg-login" data-comment-parent="268_comment_103929">Add My Comment</button> <a href="#" class="cancel-reply">Cancel</a> </form>

Text Content

What is a Computer Network?
Scrollen Sie nach unten, um weiterzulesen ▼Scrollen Sie nach unten, um weiterzulesen ▼
<iframe src="//www.googletagmanager.com/ns.html?id=GTM-PWWZSH" height="0" width="0" style="display:none;visibility:hidden"></iframe>
xPrivacy NoticeTechTarget and its partners employ technology such as cookies to improve user experience, performance, for personalizing content and advertising. For more information, see our Cookie Policy or to manage your preferences, click here.
By closing this message box or continuing to use our site, you agree to our use of cookies  and our Privacy Policy.   OK  ×  Show Purposes  Dismiss  
SearchNetworking
Search the TechTarget Network
Sign-up now. Start my free, unlimited access.
Login
Register
Techtarget Network
News
Features
Tips
More Content
Answers
Buyer's Guides
Definitions
Essential Guides
Opinions
Photo Stories
Podcasts
Quizzes
Tutorials
Sponsored Communities
Networking E-zines
SearchNetworking
Topic  
Campus LAN
Data Center
Infrastructure
Network management
Network Security
Networking careers
SDN
Telecom networks
WAN
All Topics
SubTopic    All Subtopics
WLAN
All Subtopics
Follow:
Home
Campus LAN
Network management
computer network 
Definition
computer network 
Posted by: Margaret Rouse
WhatIs.com
Contributor(s): Alexander Gillis, Reg Harbeck and Jessica Scarpati
Share this item with your network:
A computer network, also referred to as a data network, is a series of interconnected nodes that can transmit, receive and exchange data, voice and video traffic. Examples of nodes in a network include servers or modems. Computer networks commonly help endpoint users share resources and communicate. They commonly appear all over the place, such as homes, offices and government administrations. The use of computer networks can overcome geographic barriers and enable the sharing of information. Computer networks enable the usage and sharing of any number of applications and services, including emails, video, audio and plenty of other types of data, over the internet.
Network devices use a variety of protocols and algorithms to specify exactly how endpoints should transmit and receive data. For example, the Ethernet standard establishes a common language for wired networks to communicate, and the 802.11 standard does the same for wireless local area networks (WLANs). 
Uses
Computer networks have a variety of uses that many would see as essential today, including the following:
file sharing, which enables users to share data files through a network; 
application sharing, which enables users to share applications through a network; 
hardware sharing, which enables users in a network to share hardware devices, such as printers and hard drives; 
client-server model, which enables data to be stored on servers, where end-user devices -- or clients -- can access that data; 
voice over IP (VoIP), which enables users to send voice data through internet protocols; 
communication, which can include video, text and voice; 
e-commerce, which enables users to sell and buy products over the internet; and 
gaming, which enables multiple users to play together from various locations. 
In addition, program design requires skills and knowledge in both computer network technologies and program requirements.
How computer networks work
Computer networks operate using a varying set of hardware and software. All packet-switched networks use Transmission Control Protocol/Internet Protocol (TCP/IP) to establish a standard means of communication. Each endpoint in a network has a unique identifier that is used to indicate the source or destination of the transmission. Identifiers include the node's IP address or Media Access Control (MAC) address. Endpoint nodes, which are used for routing purposes, include switches and routers, servers, personal computers, phones, networked printers and other peripheral computing devices, as well as sensors and actuators. The Open Systems Interconnection (OSI) model defines how data is transferred between computers.
A network's capacity is how much traffic the network can support at any one time while still meeting service-level agreements (SLAs). Network capacity is measured in terms of bandwidth. Bandwidth is quantified by the theoretical maximum number of bits per second (bps) that can pass through a network device. Throughput is a measure of the actual speed of a successful transmission after accounting for factors like latency, processing power and protocol overhead.
Advantages
Advantages of using computer networks include the following:
file sharing, which enables users to share data between users; 
resource sharing, which enables users to share multiple devices, such as copiers and printers; 
communication, which enables users to send and receive messages and data in real time from multiple devices; 
convenience in that data is accessible through an internet connection; 
cost in that there are reduced hardware costs since networked devices can share resources; and 
storage, which enables users to access data that's stored remotely or on other network devices. 
Types of computer networks
Networks are often categorized by the wired or wireless transmission technology they support, as well as the scope of their domains. Some examples of computer networks include the following:
local area networks (LANs), which interconnect endpoints in a single domain; 
in contrast, wide area networks (WANs), which interconnect multiple LANs; 
metropolitan area networks (MANs), which interconnect computer resources in a geographic area; 
storage area networks (SANs), which interconnect storage devices and resources; 
personal area networks (PANs); 
WLANs; 
campus area networks (CANs); 
virtual private networks (VPNs); 
passive optical networks (PONs); and 
Networks may also be divided into subnetworks, also called subnets.
Network access
Networks can be public or private. While anyone can access the public internet, access to private and virtually private networks requires the end user to be assigned access credentials.
In the enterprise, network access control (NAC) systems typically use security policies to control access to the organization's network. This means that network devices are not allowed to connect unless they meet a predefined business policy, which is enforced by NAC products. When deployed, NAC systems immediately discover all the devices connected to a network, categorize them by type and then react to them based on preconfigured compliance rules implemented by the organization's security team.
NAC products enable device access to a network based on a specific, per-device basis, with granular controls over what type and level of access is allowed. These controls are delivered by policies that are defined in a central control system. Most NAC systems can also integrate with Active Directory (AD) in order to control network access based on group policy, ensuring users only have the network access required to fulfill their jobs.
Network topologies
A network topology is the physical or logical structure of a network. Network topologies include the following:
Full mesh network. All nodes are connected to each other and can exchange data. 
Partial mesh network. Some nodes are connected to each other in a full mesh scheme, but others are only connected to one or two other nodes in the network. 
Point-to-point network. Network connectivity is limited to two endpoints. 
Star network. All network nodes are connected to a common central computer. 
Tree network. Two or more star networks are connected together. 
Bus network. Network devices are attached directly to a transmission line. All signals pass through all devices, but each device has a unique identity and recognizes signals intended for it. 
Ring network. Network devices are connected to each other in a ring format, where each device is connected to at least two other devices.
A visual of different types of network topology
Network topology vs. network fabric
Network topologies are the physical or logical structure of a network. The term network fabric describes the way each topology creates a particular type of crisscross pattern of connections, such as bus, ring and star topologies. The word fabric is used as an allusion to threads in a fabric. A good way to remember the difference is that network fabrics describe a network topology.
Margaret Rouse asks:
What computer network topology do you consider the most secure and stable for enterprises?
Join the Discussion
This was last updated in December 2019
Continue Reading About computer network
Why network engineers need to learn to code
Five vital trends in network security
Advice on working with network enterprises vs. service providers
Learn how to become a network architect
Network security issues top the list of enterprise priorities
Related Terms
edge router
An edge router is a specialized router located at a network boundary that enables an internal network to connect to external ... 
See complete definition
Multiprotocol Label Switching (MPLS)
Multiprotocol Label Switching (MPLS) is a protocol-agnostic routing technique designed to speed up and shape traffic flows across... 
See complete definition
Routing Information Protocol (RIP)
Routing Information Protocol (RIP) is a distance vector protocol that uses hop count as its primary metric. 
See complete definition
Dig Deeper on Campus area network
IoT architecture layers and design change to address data deluge
By: Scott Robinson
local area network (LAN)
By: Margaret Rouse
mesh network topology (mesh network)
By: Margaret Rouse
network topology
By: Margaret Rouse
Join the conversation
1 comment						
Send me notifications when other members comment.
Add My Comment
Register
I agree to TechTarget’s Terms of Use, Privacy Policy, and the transfer of my information to the United States for processing to provide me with relevant information as described in our Privacy Policy.
Please check the box if you want to proceed.
I agree to my information being processed by TechTarget and its Partners to contact me via phone, email, or other means regarding information relevant to my professional interests. I may unsubscribe at any time.
Please check the box if you want to proceed.
Login
Forgot your password?
Forgot your password?
No problem! Submit your e-mail address below. We'll send you an email containing your password.
Submit
Your password has been sent to:
Please create a username to comment.
Oldest 
Newest 		
[-]
Margaret Rouse
- 10 Oct 2006 10:56 AM
What computer network topology do you consider the most secure and stable for enterprises?
Add My Comment			
Cancel
-ADS BY GOOGLE
File Extensions and File Formats
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
#
Latest TechTarget resources
Unified Communications 
Mobile Computing 
Data Center 
IT Channel 
SearchUnifiedCommunications
How to monitor user-generated content in a video world
User-generated enterprise video is gaining popularity but can cause headaches for IT if left unchecked. Learn how to manage and ...
Microsoft faces hurdles in selling Teams to first-line workers
Microsoft is a long way from convincing businesses with first-line workforces to buy the collaboration app Microsoft Teams, ...
CPaaS market growth outpaces UCaaS as organizations demand APIs
Demand for API capabilities is driving the CPaaS market. Learn why organizations want APIs in addition to UCaaS platforms and why...
SearchMobileComputing
Sophos adds mobile threat defense app to Intercept X line
Intercept X for Mobile is compatible with iOS and Android devices, as well as Chrome OS and Chromebooks. It offers privacy ...
Ownership scenario should dictate mobile device policies
The policies organizations should deploy for BYOD devices compared to kiosk devices are very different. Learn how organizations ...
Explore Android OS alternatives for enterprise use
While enterprise adoption for Android OS alternatives, IT professionals should learn about the options available so they can ...
SearchDataCenter
Top data center skills admins can use in 2020
The 2019 tech job sector saw consistent growth and job availability. In 2020, admins should develop expertise on cloud ...
Organizations try to predict the effect of 5G infrastructure
With more 5G and IoT devices emerging, admins must prepare their data centers to support low-latency apps and edge computing with...
Top infrastructure and operations technology myths of 2019
Admins are consistently evaluating technology to improve I&O efficiency. Cost, integration and business goals are key components ...
SearchITChannel
Netgear vulnerability raises router security concerns
Security researchers revealed Netgear firmware exposed TLS certificate keys, but SearchSecurity discovered it wasn't the first ...
5G opportunities for channel partners yet to take shape
At the beginning of 2020, many aspects of 5G technology remain abstract, but channel partners can benefit by preparing their ...
2019 data breach disclosures: 10 more of the biggest
Here is a list of 10 of the largest data breaches (mostly) from the second half of 2019, including DoorDash, T-Mobile, Capital ...
About Us
Meet The Editors
Contact Us
Privacy Policy
Advertisers
Business Partners
Media Kit
Corporate Site
Contributors
Reprints
Archive
Site Map
Answers
Definitions
E-Products
Events
Features
Guides
Opinions
Photo Stories
Quizzes
Tips
Tutorials
Videos
All Rights Reserved, 
Copyright 2000 - 2020, TechTarget
Do Not Sell My Personal Info
ArialArial BlackComic Sans MSCourier NewNarrowGaramondGeorgiaImpactSans SerifSerifTahomaTrebuchet MSVerdana1234567ParagraphHeader 1Header 2Header 3Header 4Header 5Header 6Enter URL:Paste the code:
Close
<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=228428&fmt=gif" />
<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=38436&fmt=gif" />