Skip to main content
Engineering LibreTexts

7: Networking and Communication

  • Page ID

    Learning Objectives

    Upon successful completion of this chapter, you will be able to:

    Today’s computing and smart devices are expected to be always-connected devices to support the way we learn, communicate, do business, work, and play, in any place, on any devices, and at any time. In this chapter, we review the history of networking, how the Internet works, and the use of multiple networks in organizations today.

    • 7.1: Introduction to Networking and Communication
      The way we communicate has affected every important aspect of our lives and the world on a broad scale. Education, business, politics, etc.. are all heavily dependent on the internet to communicate effectively.
    • 7.2: Providing Resources in a Network
      Networks connect various devices in our homes, offices, schools, etc. Many devices could be simultaneously connected to the same network, such as a printer, a laptop, a smartphone, and an iPad.
    • 7.3: Internet Connections
      There are various ways in which one can connect to the internet. A connection to the internet could be through dial-up, cable, satellite, cellular, and DSL.
    • 7.4: The Network as a Platform Converged Networks
      There are different types of networks, converging networks, and separate networks. Separate networks do not allow different devices connected to different networks to communicate because they aren't interconnected. However, converged networks are built to convey data among various devices connected to the same network.
    • 7.5: The Changing Network Environment Network Trends
      Technology is constantly evolving, and new network trends influence organizations and consumers.
    • 7.6: Network Security
      Like any other aspect in life, everything has its cons, and the cons of the internet are ensuring network safety and security. Ensuring a network is secure requires technologies, protocols, devices, tools, and techniques that keep data secure and moderate threat vectors.
    • 7.7: Summary

    • Was this article helpful?