Skip to main content

What are Computer Networks?

We use the internet everyday, but it isn't often – if ever – that we need to consider how it works.  That's because the protocols powering the internet were intentionally designed to operate as invisibly as possible.  Built around a common language, networks enable devices to communicate with each other and share resources.  By standardizing how computers talk with each other, we have expanded the scale of networks over time seeking to achieve a global cloud infrastructure.

The micro reflects the macro and vice versa—Fibonacci patterns show up from space to cauliflower. The tiniest most mundane act reflects the biggest creations we can imagine.

     — Kat Aaron


Connected Communities 

Computer networks consist of nodes – which are devices that are seeking to communicate – as well as the links between them.  Under some circumstances, nodes will connect to other nearby nodes and create a mesh that data can traverse while seeking it's destination. 

Edge networks form around bottlenecks that may arise in rural and disconnected areas.  Functionally, this means that every person trying to connect to the World Wide Web must share a single Internet route – like an overly congested highway.  This can increase the cost of internet service, as well as effect the overall speed, availability and reliability. 

The ways that communities connect to the Internet relies entirely on what is available within their physical geography.  While in a major city, there may be many options for access to fast and reliable fiber Internet.  Trying to connect to the Internet from rural Alaska, communities may find themselves restricted to a satellite connection.

These "digital deserts" can arise along geological boundaries – such as mountains or islands.   More importantly, marginalized areas – such as Black, Indigenous and Hispanic communities – are not always offered equal or adequate Internet access.  During 2021, it was estimated that over 42 million Americans do not have access to terrestrial broadband Internet – with 4 million in Texas alone.

What areas are disconnected?  Why might that be?

Networks, similar to the rest of computing, leans heavily on abstractions that enable people (and network engineers) to comprehend the infrastructure required to power telecommunications at this scale.  In order to build a global infrastructure, digital technologies have created a stratified system that simplifies data shared in between these layers. 

Abstraction is related to modular design – or creating discreet modules that communicate through a common language.  Similarly, systems thinking enables people to consider the complexity of our real world – and all of its relationships – at both the large and small scale. 

1000000040.jpg 1000000041.jpg

This foresight during the creative process has worked to simplify our relationship with technology.  You don't need to understand electrical engineering to build a computer system from parts you bought off-the-shelf.  Similarly, data isn't concerned about routing its own path across the internet and only follows the one assigned to it.

Scales of Connection

Scale is a foundational way these systems are abstracted when trying to classify them.  This is important to consider because different networks may have unique requirements.  Your home network only needs to juggle a handful of people's data, while a college campus will be handling much more traffic from people located around the globe.

Personal Area Network

While your phone is connected to your headphones through BlueTooth, you are creating a Personal Area Network.  These, as the name implies, operate on a smaller and more intimate scale.  PANs utilize wired and wireless technologies connected to a central computing device – like a cellphone or laptop. 

Add console connected to tv as an edge network 

Local Area Network

A Local Area Network contains all of the nodes and links within a limited (often architectural or regional) area.  This includes desktop, television and console devices attached by cable, as well as other devices connected wirelessly.  

This could be as small as your home or some larger contained area – like a college campus or corporate headquarters. These institutions must subscribe to Internet service – just on a larger scale.  They may hundreds of interconnected wireless routers blanketing a mesh network over a large physical area.

Universities can have several campuses and corporations may have branch offices at different scales.  A Virtual Private Network creates a private tunnel connecting two geographically separated LANs into one.  This enables devices over vast distances to communicate as if they were nearby.  This can be accomplished invisibly through hardwired infrastructure, as well as on a device-by-device basis by connecting to a VPN server with appropriate credentials.

Each Local Area Network has a modem responsible for transmitting data to and from an Internet Service Provider.  This hardware is used to modulate – or translate – data into a signal that can be sent along a physical cable, radio wave or other connection.

The router connects to the modem and orchestrates communication between all the devices connected to it. While connected, each device is assigned a Private IP Address – a unique identification number on that network.  This allows devices to quickly and intentionally exchange information over your network, even if there is no access to the outside of World Wide Web.

Three Private IP address ranges have been reserved for LAN networks: 192.168.68.100, 172.16.0.0, and 10.0.0.100.

Modern routers often incorporate wireless connectivity through the Wi-Fi standard – which turns data in radio waves that can be transmitted wirelessly to devices.  Ethernet is a standard for enabling network device communication over a wire.  Ethernet cables are given a category designation – with higher categories meeting the performance requirements of data centers.

What could result from the wrong device accidentally receiving it's data?

When connecting computers to a wired network, there are a few devices that can incorporate physical cables to facilitate links between nodes.  Judging solely by appearance, it can hard to tell them apart.

1000007061.jpg

Router

image.png

Hub

1000007060.jpg

Switch

A repeater hub can connect many devices to the network on once, but will openly broadcasts all data it receives to every device connected to it.  They can be cost-effective because of their simple design, but they greatly increase the potential for data sniffing – or the data being intercepted by someone other than the intended recipient. 

On the other hand, a switching hub behaves more intelligently by only sending data to it's intended recipient.  This requires electronics to process the information being transmitted through it, but ultimately results in better reliability and security.

Wide Area Network

Your modem, acting as the gateway to the internet, is also assigned a Public IP Address. Similar to a phone number or street address, this is how networks find each other over the vast worldwide internet infrastructure.

These disparate Local Area Networks – such as your home, your neighbors, city, county and state – are conglomerated together into a Wide Area Network or WAN. 

The Path of Data

Data may need to travel vast distances to get from it's origin to final destination.  This can include multiple internet service providers and connection types – ranging from physical cables to wireless connections.  Carrying data around the globe can include anything from vast underwater cable networks to satellite relays in geostationary orbit.

Whenever data is transmitted over a network, it is first broken into small "packets" by your computer.  These are transmitted to the network router and across the infrastructure laid by your Internet Service Provider to a local hub and, possibly, a regional or central hub.

Your Provider contracts access to middle-mile and long-haul providers specializing in quickly transmitting data across a geographical region.  These carry data from outlying areas into major metropolitan areas where, if necessary, it can be sent around the globe.  The Eastern US shares many undersea cable connections with Western Europe, just like the Western US connects to China and Japan.

Through the Border Gateway Protocol, data can find a route across this patchwork of autonomous and independently-owned network systems.  This process relies on the mutual agreement between ISPs that every network system will act as a neutral peer to all other networks ensuring that messages will always be passed along towards its destination.  If these data packets contain any erroneous or fabricated metadata, they will likely get lost during this exchange process.

From here, packets will take the most direct route to it's destination.  Performing the same process in reverse, data transits through middle-mile and long- haul providers, before filtering through regional and local internet infrastructures.  Finally, the data enters the intended router before being delivered to its destination.

When the receiver wants to send a response back to the original sender, it must repeat this entire process again. Modern software systems often implement mechanisms that will remember the quickest connection between two points. Web browsers, for example, are built on top of open protocols that enable two computers to create a persistent connection that can be reused for transporting data.

Distributed Applications

The modern internet, as we know it, predominately operates within the client-server model.  This means that one computer – a server – is used to respond to the requests of other computers – known as clients. Perhaps the most well known example of the client–server model is the modern World Wide Web

Through a Web browser, we can navigate to a server using a graphical interface and enter a URL – such as example.com.  This is more specifically known as a domain name and points towards the address of a Web server on the open internet.  By leveraging the HTTP protocol, we can request data from a server and receive the response back in the form of an interactive website.

When you enter example.com into the browser's address bar, it needs to be translated into an IP address for our computer to connect to.  The Domain Name System enables anyone in the world to know where to locate the web server over the World Wide Web.

For example.com, the IP is "92.122.244.34".  

While still less common for consumers, the peer-to-peer model is becoming more popular.  These behave similarly to the mesh networks that allow ISPs to transmit data around the globe through interconnected networks.  Within this network structure, each peer has the ability to act as both a server and a client to share data in a more efficient way.  Each peer has the same privileges and power, creating decentralized networks – such as BitTorrent, OwnCloud and social media like the Fediverse or Bluesky.

Open Standards

Data transmission over the internet is built upon a technology first explored in 1960s with ARPANET.  By the 1980s, the standard for communication over the internet – known as TCP/IP or more commonly the Internet Protocol Suite – was first implemented.  Simplified, access over the internet is broken into four layers:

Each of these layers provide standards for how to ensure each layer can communicate with other devices through this protocol.  At each level, we are ensuring that all nodes on the network are speaking a common language.

memory

Physical Layer

This layer handles how data signal is encoded and physically transmitted over wires.  This layer can function in different ways, depending on your internet connection type – such as internet over coaxial cable or fiber optic cable.

 

Cable

Link Layer

This layer handles how data is transmitted over the network through physical hardware such as Network Cards and Ethernet cables.  This also includes hardware level identification of devices on the network, through a MAC Address, that allows the router to know which device is which, even when it hasn't been previously connected before.

 

lan

Network Layer

This layer dictates how nodes can find each other across the network, utilizing IP addresses and routing to determine how to get from point A to point B.  This is the layer where devices are provided IP addresses on their local and wide area networks, and traces the optimal route between two nodes using these IP addresses.  Data transmitted over this layer is broken up into small segments that are easier to transmit.  TCP and UDP.

 

swap_horiz

Transport Layer

This layer is responsible for ensuring that individual nodes can communicate with each other reliably and without errors.  Now that data is broken up into small segments for transmission, we can chose to transport this data in different ways. 

 

api

Application Layer

This is the top most layer of the internet where protocols such as HTTP and SMTP are implemented.  This is the layer that most people interact with when they are browsing the internet through operating system applications.  At this level, the user doesn't need to consider how or where the data is traveling.  It happens almost invisibly. 

In between each layer, as our data transmission  is broken into smaller and smaller pieces by our physical device and the software installed on it, "metadata" is appended to each small packet.  These "headers" detail how this packet of data relates to other packets, as well as the path taken and route still in progress.

Once two nodes on a network have initiated communication - such as your laptop connecting to a remote server – through the internet later by up address, they need to confirm the method for communication.  When developers design an application, they can choose to transmit data over the internet through two protocols, both with benefits and drawbacks.

talk about data in transit encryption

TCP ensures that all data will arrive with perfect fidelity and in the current order.  In order to do this, both devices need to "handshake" – or agree to initiate a data connection between them.  Packet 1 will be received before Packet 2, and so on.  Each data packet is individually verified to ensure it was received correctly and, if it isn't, it is transmitted again and again until it is properly received.  This is more process intensive and can take longer because it transmits one packet at a time.  This protocol is used for HTTP, the backbone of the world wide web, and TLS, which encrypts web traffic and verifies the identities of all nodes.

UDP, on the other hand, allows a client to begin rapidly sending data to a server without first needing to "handshake".  Packets can be transmitted in parallel, meaning that the server will not receive data in any particular order or within a specific time frame.  Packet 2 could be received first, followed by 1 and 3.  In the event that a packet is never received or fails basic integrity checks, the server is made aware of the error but the data is never transmitted again.  This is more common for time-sensitive applications, online video games or live streaming services because it may be preferable to risk losing data then it is to receive it late.

Ports: software-based channels that allow multiple services to exist on one computer.  They also allow them to communicate over a local network with great complexity and versatility, without needing a domain name. This allows services to communicate behind the scenes, away from the internet.  These ports are also often reserved for specific protocols, such as HTTP, HTTPS, SSH and DNS.