0% found this document useful (0 votes)
107 views5 pages

Internet Working

Internetworking connects multiple computer networks using devices, protocols, and technologies to facilitate communication and data exchange, forming the backbone of the internet and enterprise networks. It enhances organizational communication, security, and efficiency through centralized data management, business process automation, and secure remote access. Key technologies include routers, switches, firewalls, and various networking protocols such as TCP/IP and Ethernet.

Uploaded by

ceciliagrace2003
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
107 views5 pages

Internet Working

Internetworking connects multiple computer networks using devices, protocols, and technologies to facilitate communication and data exchange, forming the backbone of the internet and enterprise networks. It enhances organizational communication, security, and efficiency through centralized data management, business process automation, and secure remote access. Key technologies include routers, switches, firewalls, and various networking protocols such as TCP/IP and Ethernet.

Uploaded by

ceciliagrace2003
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

INTERNETWORKING

Internetworking is the process of connecting multiple computer networks using networking


devices, protocols, and technologies to enable seamless communication and data exchange. It
forms the backbone of the internet and enterprise networks, allowing different systems to
communicate efficiently.

Internetworking involves interconnecting LANs, WANs, and MANs, using protocols like TCP/IP
for communication and employing devices like routers, switches, and firewalls
How internetworking is used in an organization

Organizations use internetworking to improve communication, productivity, security, and


efficiency.

1. Network security and protection


▪ Firewalls and Intrusion Prevention Systems (IPS): Protect networks from cyber threats.
▪ Authentication & Access Control: Protocols like RADIUS and multi-factor authentication
ensure only authorized personnel access critical data.

2. Centralized data management


▪ Organizations use centralized servers and cloud storage for secure and easy access to
business data.
▪ Employees can retrieve files from any location through VPNs or cloud-based platforms
like Google Drive or OneDrive.

3. Business process automation


▪ Internetworking supports Enterprise Resource Planning (ERP) and Customer
Relationship Management (CRM) systems, allowing automation of business tasks.
▪ IoT Integration: Smart devices like security cameras and automation systems connect via
the network to streamline operations.

4. Efficient communication
▪ Email & Messaging Services: Employees can send and receive emails, use instant
messaging, and collaborate via platforms like Microsoft Teams or Slack.
▪ VoIP & Video Conferencing: Technologies like Zoom and Cisco WebEx use
internetworking to facilitate voice and video calls over the internet.
▪ Unified Communication Systems: Integration of voice, video, and messaging ensures
smooth internal and external communications.

5. Secure remote access (VPNs & Cloud Computing)


▪ Employees working remotely can securely access company resources using Virtual
Private Networks (VPNs).
1
▪ Cloud computing allows businesses to run applications and store data securely on cloud
platforms like AWS (Amazon Web Services), Azure, or Google Cloud.

6. Improved collaboration across multiple offices


▪ Large companies with branches in different locations use Wide Area Networks (WANs)
to interconnect their offices.
▪ Employees can share resources and applications across sites using high-speed internet
and cloud-based solutions.

7. E-commerce and Online Transactions


▪ Businesses leverage internetworking for secure online transactions, integrating payment
gateways, and managing inventory in real time.

INTERNETWORKING TECHNOLOGIES

Internetworking technology encompasses the hardware, software, and protocols used to connect
multiple networks, ensuring seamless communication and data exchange. It forms the backbone
of the internet, corporate networks, and telecommunication infrastructures.

Below is a detailed breakdown of the key concepts of internetworking.

1. NETWORK DEVICES

ROUTERS

Routers are networking devices that connect multiple networks by forwarding data packets
based on their IP addresses. They determine the best path for data transmission and direct it
accordingly.

Types of routers

▪ Core Routers – Used within an ISP to handle high-speed traffic.


▪ Edge Routers – Connect enterprise or ISP networks to external networks.
▪ Wireless Routers – Provide both wired and wireless connectivity.

SWITCHES

Switches operate within a local area network (LAN) and manage communication between
devices by forwarding data based on MAC addresses.

Types of switches

▪ Unmanaged Switches – Basic plug-and-play devices.


▪ Managed Switches – Allow configuration, VLANs, and advanced monitoring.
▪ Layer 3 Switches – Combine switching and routing functions.
2
HUBS & REPEATERS

▪ Hubs – Basic network devices that transmit data to all connected devices without filtering.
▪ Repeaters – Boost and regenerate signals over long distances to prevent signal degradation.

BRIDGES & GATEWAYS

▪ Bridges – Connect two similar network segments and filter traffic using MAC addresses.
▪ Gateways – Act as intermediaries between different network architectures and protocols (e.g.,
VoIP gateways convert voice data between analog and digital formats).

FIREWALLS

Firewalls are security devices that monitor and control incoming and outgoing network traffic
based on predefined security rules.
Types of Firewalls

▪ Packet Filtering Firewalls – Inspect data packets based on rules.


▪ Stateful Inspection Firewalls – Monitor active connections for added security.
▪ Next-Generation Firewalls (NGFWs) – Combine deep packet inspection with intrusion
prevention systems.

2. NETWORKING PROTOCOLS

TCP/IP (Transmission Control Protocol/Internet Protocol)

The TCP/IP protocol suite governs how data is transmitted over networks.
▪ TCP (Transmission Control Protocol) – Ensures reliable, ordered, and error-checked data
delivery.
▪ IP (Internet Protocol) – Assigns unique addresses to devices and routes data packets.

Ethernet

Ethernet is a wired networking standard (IEEE 802.3) used for LANs. It operates at different
speeds, including:

▪ Fast Ethernet (100 Mbps)


▪ Gigabit Ethernet (1 Gbps)
▪ 10-Gigabit Ethernet (10 Gbps and beyond)

Wi-Fi (IEEE 802.11)

Wi-Fi is a wireless networking standard that allows devices to connect without physical
cables. Wi-Fi standards include

▪ 802.11n – Up to 600 Mbps

3
▪ 802.11ac – Up to 1 Gbps
▪ 802.11ax (Wi-Fi 6) – Higher speeds, efficiency, and lower latency

BGP (Border Gateway Protocol)

BGP is a routing protocol used to exchange routing information between different networks,
mainly used by ISPs and large organizations. It determines the best paths for data to travel
across the internet.

DNS (Domain Name System)

DNS translates human-readable domain names (e.g., [Link]) into IP addresses, enabling
users to access websites without memorizing numerical addresses.

3. NETWORK ARCHITECTURES
LAN (Local Area Network)

A LAN connects computers and devices within a small geographic area, such as an office or
home. LANs use Ethernet or Wi-Fi for communication.

WAN (Wide Area Network)

WANs cover large areas, such as cities or countries. The internet itself is the largest WAN.
WANs typically use leased lines, MPLS, or VPNs for connectivity.

MAN (Metropolitan Area Network)

A MAN spans a metropolitan area, such as a city, and provides network connectivity to
businesses and government agencies. It uses high-speed fiber-optic connections.

VPN (Virtual Private Network)

A VPN encrypts internet connections to provide secure remote access to networks. It is


commonly used by businesses to enable employees to work securely from remote locations.

4. INTERNET TECHNOLOGIES

IPv4 & IPv6

▪ IPv4 (Internet Protocol version 4) – Uses 32-bit addresses, allowing approximately 4.3
billion unique addresses.
▪ IPv6 (Internet Protocol version 6) – Uses 128-bit addresses, providing a vastly larger
address space and improved security features.

Cloud Networking
4
Cloud networking involves using cloud-based services (e.g., AWS, Azure) for managing and
deploying network infrastructure. It provides scalability, flexibility, and cost savings.

IoT (Internet of Things)

IoT refers to the interconnection of smart devices (e.g., smart thermostats, security cameras)
that communicate over the internet to share data and automate processes.

SDN (Software-Defined Networking)

SDN separates the control plane (decision-making) from the data plane (packet forwarding)
in networking devices, allowing centralized management and automation.

You might also like