Computer Networking Basics - traversing between LAN and WAN
May 20th, 2022
|
3 mins 4 secs
|
IT Networking
Computer networking
Local Area Network
Wide Area Network
WAN
Router & Gateway
Subnet
Octet
Network Address Translation
NAT
Firewall
Demilitarized Zone
DMZ
Port Forwarding
LAN
SETUniversity.com
SET U

Garth Soshahi
Entrepreneur
What is a LAN?
Local Area Network or (LAN), examples are, home networks, office workspaces, schools, etc. are closed networks, which is also referred to as an intranet. Multiple devices are connected and communicates with each other within said closed environment.   
What is a WAN?
Wide Area Network or (WAN) is a large network of information that supports multiple LANs connecting to the internet.
Let’s discuss how does an IP, Switch, Subnet, Router & Gateway, Firewall, NAT, DMZ and Port Forwarding all work together?
Internet Protocol
Internet Protocol or (IP), is a logical address to locate or identify your specific device, for example, if your logical local IP address is 192.168.10.20 and you want to print something from your computer, your computer would search your local network for a printer that’s within that IP address and send a print request message.
Switch
The purpose of a Switch is to grant route permission to data within various types of communication networks. Similar to how traffic lights regulating roadway movement.
Router
A Router is a network device that forwards data packets between different computer networks, {think in terms of a security office, sitting at a check point and inspects all items going in and out of a building}. In simple terms, a router provides network security.
Gateway
In computer networking, a Gateway is a router’s IP address that traffic flows through when it's bound for a destination outside the LAN. When there’s a single router and other connected devices, the router's private IP address is the default gateway or (Gateway).
Later on, I will dive deeper into the many roles of a router and the different rules and functions of each subsection.
Now you may ask; How does a machine knows whether another machine is sitting within a main local area network, or sits in an outside network?
Subnet
A Subnet or Subnetwork Mask is short for ‘Subordinate Network’ or ‘Subordinate Network Mask’ sits within the local area network to mask actual IP address, it does this by mimicking the real IP address, but I assure you, it’s not an IP address. Let me explain…
Let’s say that your computer’s IP address is 192.168.0.101 and your printer’s IP address is 192.168.0.11 – between both IP address, sits the Subnet, which could be 255.255.0.0 and within that subnet, the first two octets (255.255) indicates that this LAN has a fixed range of (192.168) and any devices within that range, would potentially be in said network, and the octets (.0.0) denotes the free range, meaning that there can be any device within that range, for example: An IP address could be 192.186.0.200, because the last two octets have a range of (.0.0)
  • Side note: An Octet in computer networking creates an IP address; So, each cluster of number/s is a byte, called an “octet” as it is comprised of eight independent values, and four of these octets together, separated by dots, makes an IP Address. 
  •  Side note: All Subnet Masks must end in either a: 0, 128, 192, 224, 240, 248, 252, 254, or 255 – which determine the values of each bit position as they are “turned on” from left to right in any octet.
That being said, a Subnet defines and determines your local area network range.
Network Address Translation  
Network Address Translation or (NAT), as the name suggest, it allows the router to translate its IP address into a different IP address to communicate with the wide area network - the Internet.
Firewall
Firewalls protect local area network from being accessed by outside computer or other devices that’s trying to connect with any devices in the LAN; that’s a major security risk. The firewall commands a set of passive rules which are defined to enable a precise standard for protecting the local network from unauthorized access. The firewall blocks all ad-hoc requests traversing from a WAN, those outside devices /s will first have to sends its requests through the DMZ.
Demilitarized Zone
A Demilitarized Zone or (DMZ) is another security feature of a Router, whereby an outside device attempting to communicate with a device inside a LAN, must first request access from the devices sitting inside a demilitarized zone.   
  • Side note:  A DMZ is similarly to someone requesting to see a doctor, but must first speak with the receptionist (the, device/s), then wait in the reception room (demilitarized zone), before gaining access to see the doctor.
Port Forwarding
Port Forwarding is a ‘configuration’ done to a selected port of a network switch, which allows communication for specific applications and/or device/s to perform a defined task. For instance, a Web server’s default port is: 80, a Tomcat default port is: 8080, and Cisco Meraki default port is: 443. 
  • Side note: Port Forwarding is similar to being placed into a specific room, where your requested doctor will then go to attend to you.
In closing, every computer network needs some type of the above-mentioned applications, to perform their required tasks.

Garth Soshahi View All Articles
Entrepreneur
Garth Soshahi is a serial entrepreneur and co-manager of SETnology, a Florida based service and technology company. Where he serves as the project manager for websites and software developments. He’s also a content writer, copywriter, article writer, editor, and network technician. Previously, Soshahi (as he prefers to be called), co-founded various start-ups, and as a result, has many self-taught skills, which he has learned throughout the years from the School of Hard Knocks.

Related Articles

SET University
Inspiring Techknowledge™
2025 SET University, a SETnology Company