Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      BrowserStack launches Figma plugin for detecting accessibility issues in design phase

      July 22, 2025

      Parasoft brings agentic AI to service virtualization in latest release

      July 22, 2025

      Node.js vs. Python for Backend: 7 Reasons C-Level Leaders Choose Node.js Talent

      July 21, 2025

      Handling JavaScript Event Listeners With Parameters

      July 21, 2025

      I finally gave NotebookLM my full attention – and it really is a total game changer

      July 22, 2025

      Google Chrome for iOS now lets you switch between personal and work accounts

      July 22, 2025

      How the Trump administration changed AI: A timeline

      July 22, 2025

      Download your photos before AT&T shuts down its cloud storage service permanently

      July 22, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Laravel Live Denmark

      July 22, 2025
      Recent

      Laravel Live Denmark

      July 22, 2025

      The July 2025 Laravel Worldwide Meetup is Today

      July 22, 2025

      Livewire Security Vulnerability

      July 22, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Galaxy Z Fold 7 review: Six years later — Samsung finally cracks the foldable code

      July 22, 2025
      Recent

      Galaxy Z Fold 7 review: Six years later — Samsung finally cracks the foldable code

      July 22, 2025

      Halo and Half-Life combine in wild new mod, bringing two of my favorite games together in one — here’s how to play, and how it works

      July 22, 2025

      Surprise! The iconic Roblox ‘oof’ sound is back — the beloved meme makes “a comeback so good it hurts” after three years of licensing issues

      July 22, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Learning Resources»Basic Networking Part 5 — What is Computer Networking?

    Basic Networking Part 5 — What is Computer Networking?

    June 2, 2025

    Read the All Part of Our Basic Networking Series

    1. Basic Networking Part 1
    2. Basic Networking Part 2
    3. Basic Networking Part 3
    4. Basic Networking Part 4
    5. Basic Networking Part 5
    6. Basic Networking Part 6

    What is Computer Networking?

    Introduction

    A group of computers that are linked together is referred to as computer networking. Meanwhile, a node can be a computer, printer, or any other device capable of delivering or receiving data. As a result, communication channels are the linkages that bind the nodes together.

    When tasks are shared across multiple machines in a computer network, distributed processing is used. Instead of one computer handling the entire task, each computer is in charge of a portion of it.

    What is computer networking

    Computer networking or Networking refers to the communication between connected computing devices (such as laptops, desktops, servers, smartphones, and tablets) and an ever-growing array of Internet of Things (IoT) devices (such as cameras, doorbells, refrigerators, audio/visual systems, and different sensors).

    Applications

    The following are some examples of network applications in various fields.

    1. Financial services.
    2. Marketing and sales.
    3. Information technology.
    4. Security services.
    5. Manufacturing.
    6. Cellular telephone.
    7. EDI.
    8. E-mail.
    9. Teleconferencing.
    10. CMS.
    11. VOIP.

    Objectives

    The following are the computer network’s key objectives.

    • Resource sharing.
    • Cost reduction.
    • High reliability.
    • Improve performance.
    • Communication medium.

    Categories

    Computer networks are divided into four groups based on their complexity:

    PAN: PAN : A personal area network (PAN) is a computer network built around a single person. In addition, the most typical components are a computer, a cell phone, or a personal digital assistant. PAN can then utilize this information to connect these personal devices to a digital network and the internet by establishing contact.

    LAN: A Local Area Network (LAN) is a collection of computers and peripheral devices connected in a local area, such as a school, laboratory, house, or workplace. It is a widely used network for sharing data, printers, games, and other software. The most basic type of LAN network is one that connects PCs and printers in a person’s home or company.

    MAN: To begin, a Metropolitan Area Network, or MAN, is a computer network that stretches across a city, a college campus, or a small area. Second, unlike a LAN, which is normally limited to a particular building or place, this network is far larger. As a result, depending on the configuration, this type of network can span distances ranging from a few miles to tens of kilometers.

    WAN: The WAN (Wide Area Network) is another important computer network that spans a big geographical area. A WAN network system, on the other hand, could be a LAN/MAN link that connects to other LANs/MANs via telephone lines and radio waves. It is usually limited to a single business or organizations.

    Summary

    To summarize, computer networking is the process of bringing applications and devices together to achieve a desired objective or purpose. Computer networks can be just a router and a laptop or scale to an entire datacenter, depending on your requirements.

    Love our articles? Make sure to follow us on Twitter and GitHub, we post article updates there. To join our KaliLinuxInfamily, join our Telegram Group and Whatsapp Channel. We are trying to build a community for Linux and Cybersecurity. For anything we always happy to help everyone on the comment section. As we know our comment section is always open to everyone. We read each and every comment and we always reply.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleBasic Networking Part 6 – What is OSI Model?
    Next Article Basic Networking Part 4 — What is Port?

    Related Posts

    News & Updates

    Galaxy Z Fold 7 review: Six years later — Samsung finally cracks the foldable code

    July 22, 2025
    News & Updates

    Halo and Half-Life combine in wild new mod, bringing two of my favorite games together in one — here’s how to play, and how it works

    July 22, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Enable ESM in Ubuntu 20.04 LTS to Continue Getting Updates

    Linux

    Verdansk is coming back to Call of Duty: Warzone, and I’m pretty sure I know which weapon EVERYONE will be putting in their loadouts

    News & Updates

    3 Apple Intelligence features that would convince me to ditch Gemini and ChatGPT

    News & Updates

    CVE-2025-5935 – Open5GS AMF/MME Denial of Service Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    CVE-2025-49011 – SpiceDB Denial of Authorization Vulnerability

    June 6, 2025

    CVE ID : CVE-2025-49011

    Published : June 6, 2025, 6:15 p.m. | 1 hour, 33 minutes ago

    Description : SpiceDB is an open source database for storing and querying fine-grained authorization data. Prior to version 1.44.2, on schemas involving arrows with caveats on the arrow’ed relation, when the path to resolve a CheckPermission request involves the evaluation of multiple caveated branches, requests may return a negative response when a positive response is expected. Version 1.44.2 fixes the issue. As a workaround, do not use caveats in the schema over an arrow’ed relation.

    Severity: 3.7 | LOW

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    CVE-2025-45661 – miniTCG XSS

    June 18, 2025

    OpenAI’s ChatGPT claims neither Sam Altman nor Elon Musk is suited to advance AI if humanity is at stake — as Microsoft Copilot throws the ball back in the court

    May 13, 2025

    CVE-2025-1991 – IBM Informix Dynamic Server Denial of Service Buffer Overflow

    June 28, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.