Blame
| f4b2a3 | R. Bishop | 2025-03-07 21:29:27 | 1 | # What is Networking? |
| 2 | ||||
| 3 | ## Understanding Networking |
|||
| 4 | ||||
| 5 | Networking refers to the process of connecting computers, devices, and systems to enable **communication, data sharing, and resource access**. Networks range from small local connections to large global infrastructures like the **internet**. Networking is essential in business, telecommunications, industrial automation, and home environments, ensuring seamless communication and data exchange. |
|||
| 6 | ||||
| 7 | --- |
|||
| 8 | ||||
| 9 | ## Why is Networking Important? |
|||
| 10 | ||||
| 11 | ### **Data Sharing & Communication** |
|||
| 12 | - Enables devices to exchange information efficiently. |
|||
| 13 | - Supports **real-time communication** through email, video conferencing, and messaging services. |
|||
| 14 | ||||
| 15 | ### **Resource Sharing** |
|||
| 16 | - Allows multiple users to share hardware (e.g., **printers, storage devices, internet connections**). |
|||
| 17 | - Centralizes **data storage and backups** to improve security and efficiency. |
|||
| 18 | ||||
| 19 | ### **Scalability & Remote Access** |
|||
| 20 | - Networks can be **expanded** to accommodate more users and devices. |
|||
| 21 | - Enables **remote access** to systems and data from anywhere in the world. |
|||
| 22 | ||||
| 23 | ### **Security & Centralized Management** |
|||
| 24 | - Provides **controlled access** through authentication protocols. |
|||
| 25 | - Implements **firewalls, encryption, and monitoring tools** for data protection. |
|||
| 26 | ||||
| 27 | --- |
|||
| 28 | ||||
| 29 | ## Types of Networks |
|||
| 30 | ||||
| 31 | ### **1. Local Area Network (LAN)** |
|||
| 32 | - Covers a **small geographical area** (e.g., home, office, school). |
|||
| 33 | - Uses **Ethernet cables or Wi-Fi** to connect computers and devices. |
|||
| 34 | - Example: Office networks, home Wi-Fi setups. |
|||
| 35 | ||||
| 36 | ### **2. Wide Area Network (WAN)** |
|||
| 37 | - Spans **large distances**, connecting multiple LANs. |
|||
| 38 | - Uses public or private **telecommunication links (fiber, satellites, leased lines).** |
|||
| 39 | - Example: The **internet**, corporate enterprise networks. |
|||
| 40 | ||||
| 41 | ### **3. Metropolitan Area Network (MAN)** |
|||
| 42 | - Covers a **city or metropolitan area**, larger than LAN but smaller than WAN. |
|||
| 43 | - Typically used by **municipalities, universities, or large organizations**. |
|||
| 44 | - Example: City-wide Wi-Fi networks, university networks. |
|||
| 45 | ||||
| 46 | ### **4. Wireless Networks (WLAN, WWAN)** |
|||
| 47 | - Uses **radio waves** instead of physical cables. |
|||
| 48 | - Common in **homes, offices, and public spaces (Wi-Fi, 4G/5G networks).** |
|||
| 49 | - Example: Public Wi-Fi, cellular networks. |
|||
| 50 | ||||
| 51 | ### **5. Virtual Private Network (VPN)** |
|||
| 52 | - Provides **secure remote access** over the internet. |
|||
| 53 | - Encrypts data to protect sensitive communications. |
|||
| 54 | - Example: Remote employees accessing company servers securely. |
|||
| 55 | ||||
| 56 | --- |
|||
| 57 | ||||
| 58 | ## Networking Components |
|||
| 59 | ||||
| 60 | Networking requires **hardware and protocols** to function efficiently. |
|||
| 61 | ||||
| 62 | ### **Key Networking Hardware** |
|||
| 63 | | Component | Function | |
|||
| 64 | |------------|-------------------------------------------------| |
|||
| 65 | | **Router** | Directs network traffic and connects to the internet. | |
|||
| 66 | | **Switch** | Manages data traffic within a LAN, connecting multiple devices. | |
|||
| 67 | | **Modem** | Converts internet signals (DSL, fiber, cable) for connectivity. | |
|||
| 68 | | **Access Point** | Extends Wi-Fi coverage in large areas. | |
|||
| 69 | | **Firewall** | Protects networks by filtering incoming and outgoing traffic. | |
|||
| 70 | | **Network Interface Card (NIC)** | Enables devices to connect to wired or wireless networks. | |
|||
| 71 | ||||
| 72 | ### **Common Networking Protocols** |
|||
| 5f4d6f | R. Bishop | 2025-03-07 21:42:16 | 73 | - **TCP/IP (Transmission Control Protocol/Internet Protocol)** → Core communication protocol of the internet. See: [TCP/IP](https://wiki.firesecure.uk/Communications/Ethernet/Tcpip) |
| f4b2a3 | R. Bishop | 2025-03-07 21:29:27 | 74 | - **HTTP/HTTPS (HyperText Transfer Protocol Secure)** → Manages website communication. |
| 75 | - **DNS (Domain Name System)** → Translates domain names (e.g., google.com) into IP addresses. |
|||
| 76 | - **FTP (File Transfer Protocol)** → Transfers files between computers. |
|||
| 77 | - **DHCP (Dynamic Host Configuration Protocol)** → Assigns IP addresses to network devices dynamically. |
|||
| 78 | - **ICMP (Internet Control Message Protocol)** → Used for network diagnostics (e.g., ping commands). |
|||
| 79 | ||||
| 80 | --- |
|||
| 81 | ||||
| 82 | ## Wired vs. Wireless Networking |
|||
| 83 | ||||
| 84 | | Feature | Wired Networking | Wireless Networking | |
|||
| 85 | |------------|------------------|------------------| |
|||
| 86 | | **Speed** | Faster (up to 10 Gbps or more) | Slower than wired but improving (Wi-Fi 6, 5G) | |
|||
| 87 | | **Reliability** | More stable, less interference | Susceptible to signal interference | |
|||
| 88 | | **Security** | Easier to secure (physical access required) | Requires encryption (WPA2, WPA3) | |
|||
| 89 | | **Mobility** | Limited to cable length | Highly flexible, allows movement | |
|||
| 90 | | **Installation** | Requires cables and physical connections | Easier setup, no cables required | |
|||
| 91 | ||||
| 92 | --- |
|||
| 93 | ||||
| 94 | ## Network Security Best Practices |
|||
| 95 | ||||
| 96 | - **Use strong authentication** (multi-factor authentication, unique passwords). |
|||
| 97 | - **Enable encryption** (WPA3 for Wi-Fi, VPN for remote access). |
|||
| 98 | - **Install firewalls and antivirus software** to protect against cyber threats. |
|||
| 99 | - **Keep network devices updated** to patch vulnerabilities. |
|||
| 100 | - **Monitor network traffic** for suspicious activity. |
|||
| 101 | ||||
| 102 | --- |
|||
| 103 | ||||
| 104 | ## Networking in the Fire & Security Industry |
|||
| 105 | ||||
| 106 | Reliable networking is crucial in **fire and security systems**, ensuring real-time monitoring and data transmission: |
|||
| 107 | ||||
| 108 | - **IP Surveillance & CCTV** → Uses **wired or wireless** networks for remote access. |
|||
| 109 | - **Access Control Systems** → Requires **secured networking** for authentication. |
|||
| 110 | - **Fire Alarm & Building Automation** → Relies on **Ethernet or fiber** for seamless communication. |
|||
| 111 | - **Intrusion Detection Systems** → Uses encrypted networks to prevent unauthorized access. |
|||
| 112 | ||||
| 113 | --- |
|||
| 114 | ||||
| 115 | Networking forms the **backbone of modern communication**, enabling **businesses, homes, and industries** to operate efficiently. Understanding networking fundamentals, components, and security ensures **a reliable and scalable infrastructure** for future needs. |