badge icon

This article was automatically translated from the original Turkish version.

Article
ağğğğ.webp
Network Administration-1
Description
Network technologies have become one of the fundamental infrastructures enabling communication among individuals and institutions. As the number of internet-connected devices increasesthe importance of networks continues to grow.
Basic Components of Networks
End Devices: Devices such as computers smartphones printers security cameras and IoT devices that users directly access.Intermediate Devices: Devices such as routers switches firewalls and access points that direct and secure network traffic.Transmission Medium: Media such as copper cables fiber optics and wireless connections that enable data transmission.
Network Types
LAN (Local Area Network): A type of network that connects devices within a small area.WAN (Wide Area Network): A type of network that connects multiple LANs over a broad geographic area.
Network Protocols
Ethernet (IEEE 802.3): Provides wired data transmission.Wi-Fi (IEEE 802.11): Defines wireless connections.TCP/IP: The fundamental protocol suite of the Internet.DNS: Translates domain names into IP addresses.HTTP/HTTPS: Enables the transfer of web pages.

In today’s world, network technologies have become one of the most essential infrastructures enabling communication among individuals and institutions. Now, it is not just computers but smartphones, tablets, smart systems, and even industrial machines that are connected to the internet. According to research, the number of internet-connected devices worldwide is expected to reach 50 billion by 2025. This development further underscores the critical role networks play in our lives.

Basic Components of Networks

Networks are structures that enable data exchange and consist of specific components. These components can be grouped under three main categories:

End Devices

End devices are the devices directly accessed by users on a network. They communicate via IP addresses and perform the fundamental functions of the network.

Examples of end devices include:

  • Computers (desktop, laptop, servers)
  • Smartphones and tablets
  • Network printers
  • IP cameras and security systems
  • VoIP phones
  • Smart home systems (thermostats, smart lights, etc.)

These devices serve as the origin or destination of data within the network. For example, when an employee connects to a company server or a smartphone accesses the internet via Wi-Fi, end devices are being used.

Intermediary Devices

Intermediary devices are responsible for directing and transmitting data across the network.

Devices in this category include:

  • Routers: Devices that direct data packets between networks.
  • Switches: Devices that optimize data transmission between devices within the same network.
  • Firewalls: Devices that monitor incoming and outgoing traffic to ensure security.
  • Access Points: Devices that enable wireless devices to connect to the network.

For example, in a company office where multiple computers and printers share the same network, a switch (key) is used to connect these devices. If the company needs to secure its internet connection, a firewall (firewall) is deployed.

Media

Media is the component that determines how data is physically transmitted across a network. It defines the method by which data is conveyed and can take three distinct forms:

  • Copper Cables: Transmit data using electrical signals. Examples include Ethernet cables (UTP, STP).
  • Fiber Optic Cables: Transmit data using light signals, offering high speed and long-distance advantages.
  • Wireless Transmission: Enables data transmission through electromagnetic waves. Technologies such as Wi-Fi, Bluetooth, and 4G/5G are used for wireless communication.

What is End Device

Network Types and Applications

Networks are classified into different categories based on their size, purpose, and the areas they cover.

Local Area Network (LAN)

A LAN is a type of network that connects devices within a limited area. It is commonly used in homes, offices, schools, and small businesses (common).

Characteristics:

    Wide Area Network (WAN)

    A WAN is a larger network that connects multiple LANs. For example, the internet (enormous) is a WAN.

    Characteristics:


      What Is WAN? LAN vs. WAN - Huawei

      Foundational Principles of Reliable Networks

      In designing a robust network, the following four elements must be considered:

      1. Fault Tolerance

      • Ensures the network continues to operate even when a failure occurs.
      • Prevents network downtime through redundant connections and routing protocols.

      2. Scalability

      • The network must be designed to accommodate an increasing number of users.
      • Larger enterprise networks should not experience performance degradation when new devices are added.

      3. Quality of Service (QoS)

      • Audio, video, and data traffic on the network must be prioritized.
      • For example, QoS technology ensures uninterrupted video conferencing.

      4. Security

      • Data confidentiality, integrity, and availability must be guaranteed.
      • Security measures such as firewalls, VPNs, and IDS/IPS must be implemented.

      Network Trends: Technologies of the Future

      Network technologies are continuously evolving and adapting to new trends:

      • Bring Your Own Device (BYOD): Allows employees to use personal devices in the workplace.
      • Cloud Computing: Enables storage of data on internet-based systems rather than physical servers.
      • Smart Homes and IoT (Internet of Things): Systems where devices are interconnected and capable of automated data exchange.
      • 5G and Wireless Networks: Enhance network efficiency by providing higher speeds and lower latency.

      Protocols and Models in Networks

      Network communication is not achieved merely by connecting hardware; it requires devices to exchange data according to specific rules. Computers, phones, and other network devices use certain protocols and models to communicate with each other. This section will examine the importance of network protocols, reference models, and data encapsulation processes.

      Rules in Network Communication

      For networks to function properly, specific rules must be established. These rules define how communication occurs, ensuring devices can interact seamlessly. The rules defined by network protocols consist of the following components:

      • Message Encoding: The process of converting information into a suitable format. Data is transformed into electrical signals, radio waves, or light signals for transmission.
      • Message Formatting and Encapsulation: Ensures data is transmitted in a standardized format. Headers and control information are added to enable routing and error detection.
      • Message Size: The size of each message during data transfer must remain within a defined limit. For example, Ethernet frames have a maximum size.
      • Message Timing: Controls the flow of data. Includes components such as flow control, timeout periods, and access methods.
      • Message Delivery Options: Determines how messages are transmitted using methods such as unicast (one-to-one), multicast (one-to-specific group), and broadcast (one-to-all).


      Protocols Requirements

      Network Protocols

      For two or more devices on a network to communicate without issues, they must adhere to a defined set of rules. This entire set of rules is called a protocol. Protocols are standards that determine how messages are sent, received, and interpreted.

      Basic Network Protocols

      Some commonly used protocols in network communication include:

      • Ethernet (IEEE 802.3): Defines data transmission for wired networks.
      • Wi-Fi (IEEE 802.11): Establishes standards for wireless network connections.
      • TCP/IP (Transmission Control Protocol / Internet Protocol): The foundational protocol suite of the internet, enabling global device communication.
      • HTTP/HTTPS (Hypertext Transfer Protocol): Used for displaying web pages.
      • DNS (Domain Name System): Translates domain names into IP addresses.
      • DHCP (Dynamic Host Configuration Protocol): Automatically assigns IP addresses to devices.

      These protocols determine how devices create, transmit, and interpret data packets.


      Protocols

      Protocol Suites

      Network communication does not occur through a single protocol. Various protocols work together to form a more comprehensive and functional building. These groups of protocols are called protocol suites.

      Common Protocol Suites

      1. TCP/IP Protocol Suite: Forms the foundation of the internet and is divided into four main layers:

        2. OSI Protocol Suite: This seven-layer model was developed to ensure interoperability between systems from different manufacturers. OSI model provides a structure covering all stages from physical connections to the application level.

        3. AppleTalk: A protocol suite developed by Apple, specifically designed for Apple devices. It enabled communication among Macintosh computers before the widespread adoption of IP.

        4. Novell NetWare: A network operating system protocol suite developed by Novell, based on IPX/SPX protocols. It was widely used in LAN-based networks.


        Network Protocols - Cisco

        OSI and TCP/IP Models

        To better understand how communication occurs in networks, various models have been developed. The most widely known are the OSI Model and the TCP/IP Model.


        OSI vs TCP/IP - Cisco


        OSI Model (Open Systems Interconnection)

        The OSI model provides an open standard by dividing network communication into seven layers:

        1. Physical Layer: Defines electrical signals, cables, and physical connections. Copper cables, fiber optic cables, and wireless signals operate at this layer.
        2. Data Link Layer: Enables devices to identify and communicate with each other using MAC addresses. Switches operate at this layer.
        3. Network Layer: Handles IP addressing and routing. Routers operate at this layer.
        4. Transport Layer: Includes TCP and UDP protocols to ensure reliable data delivery. Manages flow control and error correction mechanisms.
        5. Session Layer: Initiates, manages, and terminates communication sessions. Used in systems such as remote desktop applications.
        6. Presentation Layer: Handles data encryption, compression, and formatting. For example, SSL/TLS protocols operate at this layer.
        7. Application Layer: Includes protocols with which users directly interact, such as HTTP, FTP, and SMTP.


        OSI Model - Cisco

        TCP/IP Model

        The TCP/IP model, which forms the foundation of the internet, has a simplified structure compared to the OSI model and consists of four layers:

        1. Network Access Layer: Responsible for physical connections and data transmission. Includes technologies such as Ethernet and Wi-Fi.
        2. Internet Layer: Performs IP addressing and routing. Routers handle data forwarding at this layer.
        3. Transport Layer: Ensures error-free data delivery. Includes protocols such as TCP and UDP. TCP is connection-oriented and prevents data loss; UDP is faster but does not provide error correction.
        4. Application Layer: Includes protocols that interact directly with user applications. Services such as DNS, HTTP, and FTP operate at this layer.

        The OSI model provides a theoretical framework, while the TCP/IP model is an active system used in the real world. The TCP/IP model is more widely used than OSI because it was developed as the foundational protocol suite of the internet.


        TCP/IP Layers - Cisco

        Data Encapsulation Process

        Before data is transmitted across a network, it undergoes a process called encapsulation. During this process, each layer adds its own header to the data to ensure seamless communication. The data encapsulation process consists of the following stages:

        1. Application Layer: The data sent by the user is received.
        2. Transport Layer: The data is divided into segments, and TCP or UDP headers are added.
        3. Network Layer: IP addresses are added, converting the data into packets.
        4. Data Link Layer: MAC addresses are added, forming a frame.
        5. Physical Layer: The data is converted into bits for transmission.

        On the receiving device, this process process is reversed to restore the data to its original form.

        Author Information

        Avatar
        AuthorFurkan ReçberDecember 23, 2025 at 3:03 PM

        Tags

        Discussions

        No Discussion Added Yet

        Start discussion for "Network Administration" article

        View Discussions

        Contents

        • Basic Components of Networks

          • End Devices

          • Intermediary Devices

          • Media

        • Network Types and Applications

          • Local Area Network (LAN)

          • Wide Area Network (WAN)

        • Foundational Principles of Reliable Networks

          • 1. Fault Tolerance

          • 2. Scalability

          • 3. Quality of Service (QoS)

          • 4. Security

        • Network Trends: Technologies of the Future

        • Protocols and Models in Networks

          • Rules in Network Communication

        • Network Protocols

          • Basic Network Protocols

          • Protocol Suites

            • Common Protocol Suites

          • OSI and TCP/IP Models

            • OSI Model (Open Systems Interconnection)

            • TCP/IP Model

        • Data Encapsulation Process

        Ask to Küre