is two or more computer systems that are linked by a transmission medium and share one or more protocols that enable them to exchange data.
A network
are devices that send, receive, and forward data
The nodes
are the communications pathways between them
the links
perform a forwarding function
Intermediate nodes
are those that send and receive data traffic
end system nodes
also referred to as hosts
End systems
makes network applications and resources available to other hosts
A server
consumes the services provided by servers
A client
is one where some nodes, such as PCs, laptops, and smartphones, act mostly as clients. The servers are more powerful computers. Application services and resources are centrally provisioned, managed, and secured
A client-server network
is one where each host acts as both client and server. This is a decentralized model where provision, management, and security of services and data are distributed around the network. also be referred to as a workgroup
A peer-to-peer network; P2P
File sharing networks where data is distributed around the clients that use the network. Apart from consuming bandwidth and disk space, ____ sites are associated with hosting malware and illegal material.
P2P
Business and enterprise networks are typically
client-server
residential networks are more often ________
peer-to-peer
is a computer with an operating system and software designed to perform a particular network role. Examples of these roles include the switches, routers, and wireless access points that forward data, the firewalls and intrusion detection systems that enforce security rules, and the load balancers and proxies that improve network performance. Can be deployed as physical hardware or virtual
an appliance
The nodes and links of networking infrastructure are deployed to run services. Services are shared ______that allow the network to do useful work, such as sharing files or allowing employees to send email.
applications
Networks can be configured with additional properties to perform different ____. For example, the security properties of a virtual private network allow devices to join a local network from across the Internet. As another example, quality of service _____ allows optimization of a network to suit a particularly time-sensitive application, such as voice or video.
functions
refers primarily to its size and scope. The size of a network can be measured as the number of nodes, while the scope refers to the area over which nodes sharing the same network address are distributed.
A network type
is confined to a single geographical location. In a ___, all nodes and segments are directly connected with cables or short-range wireless technologies. Most of the network infrastructure in a ___ would be directly owned and managed by a single organization.
A local area network (LAN)
With an Internet router and a few computers, plus mobile devices, gaming consoles, and printers.
example of LAN; Home/residential network
A business-oriented network possibly using a centralized server in addition to client devices and printers, but often still using a single Internet router/switch/access point to provide connectivity.
example of LAN; Small office/home office (SOHO) network
A network supporting dozens of users. Such networks would use structured cabling and multiple switches and routers to provide connectivity.
example of LAN; Small and medium-sized enterprise (SME) Network
A larger network with hundreds or thousands of servers and clients. Such networks would require multiple enterprise-class switch and router appliances to maintain performance levels.
example of LAN; Enterprise LAN
A network that hosts only servers and storage, not end user client devices.
example of LAN; Datacenter
is a network of networks, connected by long-distance links. connect a main office site with multiple branch office sites, possibly in different countries. could link two or more large LANs or could be used for remote workers connecting to an enterprise network via a public network such as the Internet.
A wide area network (WAN)