Introduction to Business Computer Networks

Home and business networks are more similar than they are different

Just as many residential households use home computer networks, corporations and businesses of all sizes rely on networks to sustain their daily operations. Residential and business networks use many of the same underlying technologies. However, business networks (particularly those found in large corporations) incorporate additional features, security parameters, and usage requirements.

Business Network Design

Small office and home office (SOHO) networks normally function with either one or two local area networks (LANs), each controlled by its network router. These match typical home network designs.

As businesses grow, their network layouts expand to increasingly larger numbers of LANs. Corporations based in more than one location set up internal connectivity between their office buildings. This connectivity is called a campus network when the buildings are in close proximity, or a wide area network (WAN) when spanning across cities or countries.

Companies enable their local networks for Wi-Fi or wireless access. However, larger businesses often wire their office buildings with high-speed Ethernet cabling for greater network capacity and performance.

A laptop, tablet computer, desktop computer, wireless router, and two phones connected to the World Wide Web.
Getty Images

Business Network Features

Business networks may employ a range of security and usage features meant to control how and when users access the network.

Network Filters

Most companies authorize their employees to access the internet from inside the business network. Some install internet content filtering technology to block access to certain websites or domains. These filtering systems use a configurable database of internet domain names (such as adult or gambling websites), addresses, and content keywords that violate the company's acceptable use policy.

Some home network routers also support internet content filtering features through an administration screen. Corporations tend to deploy more powerful and expensive software solutions.

Virtual Private Networks

Businesses sometimes allow employees to log in to the company network from their homes or other external locations, a capability called remote access. A business can set up virtual private network (VPN) servers to support remote access, with employees' computers configured to use matching VPN client software and security settings.

Upload Rates

Compared to home networks, business networks send out (upload) a higher volume of data across the internet. This volume is from transactions on company websites, email, and other data published externally. Residential internet service plans supply customers with a higher data rate for downloads in return for a lower rate on uploads. Business internet plans allow higher upload rates for this reason.

Intranets and Extranets

Companies set up internal web servers to share private business information with employees. They may also deploy internal email, instant messaging, and other private communication systems. Together these systems make a business intranet. Unlike internet email, IM, and web services that are publicly available, intranet services can only be accessed by employees who are logged in to the network.

Advanced business networks also allow certain controlled data to be shared between companies. Sometimes called extranets or business-to-business networks, these communication systems involve remote access methods or login-protected websites.

An intranet website template

Business Network Security

Companies possess valuable private data, making network security a priority. Security-conscious businesses usually take additional measures to protect their networks beyond what people do for their home networks.

Centralized Security

To prevent unauthorized devices from joining a business network, companies employ centralized sign-on security systems. These tools require users to authenticate by entering passwords that are checked against a network directory. These tools also check a device's hardware and software configuration to verify it is authorized to join a network.

Password Management

Company employees can make bad choices in their use of passwords. For example, they may use easily hacked names like password1 and welcome. To protect the business network, company IT administrators set up password rules that any device joining it must follow. They may also set the network passwords of employees to expire periodically, forcing them to be changed, which is also intended to improve security.

Guest Networks

Administrators sometimes set up guest networks for visitors to use. Guest networks give visitors access to the internet and some basic company information without allowing connections to critical company servers or other protected data.

Backup Systems and VPNs

Businesses develop additional systems to improve their data security. Network backup systems regularly capture and archive critical business data from company devices and servers. Some companies require employees to set up VPN connections when using internal Wi-Fi networks, to guard against data being snooped over the air.

Was this page helpful?