Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      CodeSOD: A Unique Way to Primary Key

      July 22, 2025

      BrowserStack launches Figma plugin for detecting accessibility issues in design phase

      July 22, 2025

      Parasoft brings agentic AI to service virtualization in latest release

      July 22, 2025

      Node.js vs. Python for Backend: 7 Reasons C-Level Leaders Choose Node.js Talent

      July 21, 2025

      The best CRM software with email marketing in 2025: Expert tested and reviewed

      July 22, 2025

      This multi-port car charger can power 4 gadgets at once – and it’s surprisingly cheap

      July 22, 2025

      I’m a wearables editor and here are the 7 Pixel Watch 4 rumors I’m most curious about

      July 22, 2025

      8 ways I quickly leveled up my Linux skills – and you can too

      July 22, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025
      Recent

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025

      Zero Trust & Cybersecurity Mesh: Your Org’s Survival Guide

      July 22, 2025

      Execute Ping Commands and Get Back Structured Data in PHP

      July 22, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025
      Recent

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025

      “I don’t think I changed his mind” — NVIDIA CEO comments on H20 AI GPU sales resuming in China following a meeting with President Trump

      July 22, 2025

      Galaxy Z Fold 7 review: Six years later — Samsung finally cracks the foldable code

      July 22, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Learning Resources»Basic Networking Part 5 — What is Computer Networking?

    Basic Networking Part 5 — What is Computer Networking?

    June 2, 2025

    Read the All Part of Our Basic Networking Series

    1. Basic Networking Part 1
    2. Basic Networking Part 2
    3. Basic Networking Part 3
    4. Basic Networking Part 4
    5. Basic Networking Part 5
    6. Basic Networking Part 6

    What is Computer Networking?

    Introduction

    A group of computers that are linked together is referred to as computer networking. Meanwhile, a node can be a computer, printer, or any other device capable of delivering or receiving data. As a result, communication channels are the linkages that bind the nodes together.

    When tasks are shared across multiple machines in a computer network, distributed processing is used. Instead of one computer handling the entire task, each computer is in charge of a portion of it.

    What is computer networking

    Computer networking or Networking refers to the communication between connected computing devices (such as laptops, desktops, servers, smartphones, and tablets) and an ever-growing array of Internet of Things (IoT) devices (such as cameras, doorbells, refrigerators, audio/visual systems, and different sensors).

    Applications

    The following are some examples of network applications in various fields.

    1. Financial services.
    2. Marketing and sales.
    3. Information technology.
    4. Security services.
    5. Manufacturing.
    6. Cellular telephone.
    7. EDI.
    8. E-mail.
    9. Teleconferencing.
    10. CMS.
    11. VOIP.

    Objectives

    The following are the computer network’s key objectives.

    • Resource sharing.
    • Cost reduction.
    • High reliability.
    • Improve performance.
    • Communication medium.

    Categories

    Computer networks are divided into four groups based on their complexity:

    PAN: PAN : A personal area network (PAN) is a computer network built around a single person. In addition, the most typical components are a computer, a cell phone, or a personal digital assistant. PAN can then utilize this information to connect these personal devices to a digital network and the internet by establishing contact.

    LAN: A Local Area Network (LAN) is a collection of computers and peripheral devices connected in a local area, such as a school, laboratory, house, or workplace. It is a widely used network for sharing data, printers, games, and other software. The most basic type of LAN network is one that connects PCs and printers in a person’s home or company.

    MAN: To begin, a Metropolitan Area Network, or MAN, is a computer network that stretches across a city, a college campus, or a small area. Second, unlike a LAN, which is normally limited to a particular building or place, this network is far larger. As a result, depending on the configuration, this type of network can span distances ranging from a few miles to tens of kilometers.

    WAN: The WAN (Wide Area Network) is another important computer network that spans a big geographical area. A WAN network system, on the other hand, could be a LAN/MAN link that connects to other LANs/MANs via telephone lines and radio waves. It is usually limited to a single business or organizations.

    Summary

    To summarize, computer networking is the process of bringing applications and devices together to achieve a desired objective or purpose. Computer networks can be just a router and a laptop or scale to an entire datacenter, depending on your requirements.

    Love our articles? Make sure to follow us on Twitter and GitHub, we post article updates there. To join our KaliLinuxInfamily, join our Telegram Group and Whatsapp Channel. We are trying to build a community for Linux and Cybersecurity. For anything we always happy to help everyone on the comment section. As we know our comment section is always open to everyone. We read each and every comment and we always reply.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleBasic Networking Part 6 – What is OSI Model?
    Next Article Basic Networking Part 4 — What is Port?

    Related Posts

    News & Updates

    A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

    July 22, 2025
    News & Updates

    “I don’t think I changed his mind” — NVIDIA CEO comments on H20 AI GPU sales resuming in China following a meeting with President Trump

    July 22, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-40580 – Siemens SCALANCE LPE9403 Stack-Based Buffer Overflow Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Meta’s AI Chatbots Exposed: Caught Sexting Minors Using Celebrity Voices

    Artificial Intelligence

    Microsoft Family Safety Blocks Google Chrome in Windows 11: Workarounds Revealed

    Security

    Craft new mines in Minecraft to mine and craft more in the April Fool’s Day update you can actually play

    News & Updates

    Highlights

    CVE-2025-5012 – Workreap – Freelance Marketplace WordPress Theme File Upload Vulnerability

    June 12, 2025

    CVE ID : CVE-2025-5012

    Published : June 12, 2025, 6:15 a.m. | 3 hours, 14 minutes ago

    Description : The Workreap plugin for WordPress, used by the Workreap – Freelance Marketplace WordPress Theme, is vulnerable to arbitrary file uploads due to missing file type validation in the ‘workreap_temp_upload_to_media’ function in all versions up to, and including, 3.3.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site’s server which may make remote code execution possible.

    Severity: 8.8 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Critical Commvault Flaw Rated 10/10: CSA Urges Immediate Patching

    April 26, 2025

    CVE-2024-8973 – GitLab GitHub Import Denial of Service

    May 9, 2025

    Learn How to Display WordPress Custom Field Data With Blocks

    May 5, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.