0% found this document useful (0 votes)
22 views18 pages

Networks

Uploaded by

tharvesha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views18 pages

Networks

Uploaded by

tharvesha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 18

NETWORK TYPES

• PAN(personal area network)


• LAN(Local Area Network)
• WAN (Wide Area Network)
• WLAN (Wireless Local Area
Network)
PAN(Personal Area Network)
Advantages: Main uses:
• Convenience: PANs provide a convenient • PAN stands for Personal Area Network.
way to connect personal devices without the • It refers to a network that is used for
need for physical cables. This enhances communication among devices in close
mobility and allows users to move freely proximity to a person, typically within a range
within the PAN coverage area. of a few meters.
• Low Cost: Implementing PANs typically • PANs are commonly used for connecting
involves low hardware costs since many devices such as smartphones, tablets, laptops,
personal devices already come equipped wearable devices, and other personal gadgets.
with built-in wireless capabilities.

Disadvantages:
• Limited Range: PANs typically have a
limited range, usually a few meters,
which can restrict the mobility of
connected devices.
• Bandwidth Limitations: PANs may
have limited bandwidth compared to
wired networks, especially in the case
of Bluetooth PANs.
LAN(Local Area Network)
Advantages: Main uses:
• Cost Efficiency: LANs provide a cost- • LAN stands for Local Area Network.
effective solution for networking within a • It refers to a network of computers and other
limited geographic area, as they require less devices that are connected within a limited
infrastructure and maintenance. geographical area, such as a home, office
• Enhanced Security: LANs can be building, or campus.
configured with robust security measures • LANs are typically used to facilitate
such as firewalls, encryption, and access communication and resource sharing among
controls to protect against unauthorized devices in the same location.
access and data breaches.

Disadvantages:
• Limited Range: LANs have a restricted
coverage area, typically confined to a single
building or campus, limiting connectivity
options for devices outside this range.
• Security Vulnerabilities: LANs can be
prone to security breaches, as unauthorized
users may gain access to sensitive data or
resources if proper security measures are
not implemented.
WAN (Wide Area Network)
Advantages: Main uses:
• Global Connectivity: WANs enable • A Wide Area Network (WAN) is a type of
organizations to connect across the globe, computer network that spans a large
fostering international collaboration and geographic area, connecting multiple smaller
business expansion. networks or devices over long distances.
• Resource Sharing: WANs facilitate • It enables communication and data exchange
centralized resource sharing, improving between distant locations, such as different
efficiency by providing access to shared offices, branches, or data centres, facilitating
applications and data from remote collaboration and resource sharing across
locations. organizations or regions.

Disadvantages:
• Cost: Implementing and maintaining WAN
infrastructure can be expensive due to
equipment, bandwidth, and ongoing
operational expenses.
• Security Risks: WANs are susceptible to
security threats such as data breaches and
cyberattacks, especially when data is
transmitted over public networks.
WLAN(Wireless Local Area Network)
Advantages: Main uses:
• Mobility: WLANs provide wireless • A Wireless Local Area Network (WLAN) is a
connectivity, allowing users to access the type of computer network that enables devices
network and internet from anywhere within to connect wirelessly within a limited
the coverage area, promoting mobility and geographic area, such as a home, office, or
flexibility. campus.
• Cost-effective: WLAN setups often require • Unlike wired networks, which rely on physical
less physical infrastructure compared to cables, WLANs use radio frequency signals to
wired networks, reducing installation and transmit data between devices and access
maintenance costs. points.

Disadvantages:
• Limited Range: WLANs have a limited
coverage area compared to wired networks,
requiring additional access points for larger
spaces or outdoor environments.
• Interference: WLANs are susceptible to
interference from other electronic devices,
neighbouring networks, or physical
obstacles, which can degrade performance
and reliability.
COMPONENTS OF A NETWORK
• NIC
• Hubs
• Switches
• Routers
• Bridge
• Modem
NIC
• A NIC stands for Network Interface Card.
• It's a hardware component that enables a device
to connect to a network. Essentially, it serves as
the interface between the device (such as a
computer or a server) and the network medium
(such as Ethernet or Wi-Fi).
• NICs come in various forms, including Ethernet
cards for wired connections and Wi-Fi cards for
wireless connections.
• They typically contain a network adapter, which
facilitates the transmission and reception of data
packets over the network.
• Additionally, NICs often include drivers and
firmware to support communication protocols and
ensure compatibility with different network
environments.
HUBS
• A hub is a fundamental networking device used to
connect multiple devices within a local area
network (LAN).
• It serves as a central point for these devices to
communicate with each other.
• A hub allows devices such as computers, printers,
or servers to plug in using Ethernet cables. Each
port acts as an entry and exit point for data
transmission.
• When a device sends data to the hub, the hub
broadcasts the data to all other connected devices.
• This means that all devices receive the data,
regardless of whether it was intended for them or
not.
SWITCHES
• A switch is a networking device used to connect
multiple devices within a local area network (LAN)
and efficiently manage data traffic between them.
• Switches operate at the data link layer (Layer 2)
of the OSI model
• Switches have multiple ports, each serving as a
connection point for network devices such as
computers, printers, servers, or other switches.
• They use MAC address tables to learn the MAC
addresses of devices connected to each port,
allowing them to direct data only to the intended
recipient.
• Switches are essential for modern networks,
offering faster and more efficient data
transmission.
ROUTERS
• A router is a networking device that connects
multiple networks together, such as connecting a
local area network (LAN) to the internet.
• It operates at the network layer (Layer 3) of the
OSI model.
• Routers use IP addresses to identify devices and
networks, and they maintain routing tables that
contain information about available routes and
network destinations.
• Routers can perform other functions such as
network address translation (NAT), which allows
multiple devices on a LAN to share a single public
IP address.
• Routers play a critical role in directing and
controlling network traffic.
BRIDGE
• A bridge is a networking device that connects two
or more separate network segments or LANs,
allowing them to communicate with each other.
• t operates at the data link layer (Layer 2) of the
OSI model.
• Bridges are often used to segment large networks
into smaller, more manageable parts, improving
network performance and reducing network
congestion.
• Bridges operate within the same network and
forward packets based on MAC addresses.
• Bridges have largely been replaced in modern
networks, but they still play a role in specific
network configurations and legacy systems.
MODEM
• A modem is a device that converts digital signals from
a computer or network into analog signals suitable for
transmission over communication lines such as
telephone lines or cable lines.
• The term "modem" is short for "modulator-
demodulator."
• Modems are commonly used to provide internet access
by connecting computers or routers to the internet
service provider's network infrastructure.
• Modems can come in various forms, such as dial-up
modems for telephone lines, DSL modems for digital
subscriber lines, cable modems for cable television
lines, or fibre optic modems for fibre optic connections.
• Modems are essential components in networking,
enabling data communication over various types of
communication lines and facilitating internet
connectivity for homes, businesses, and other users.
WAP (Wireless Access Point)
• A Wireless Access Point (WAP) is a networking device
that allows wireless-enabled devices to connect to a
wired network, typically a local area network (LAN).
• It serves as a bridge between the wireless and wired
network, enabling wireless devices such as laptops,
smartphones, and tablets to access network resources
and the internet.
• WAPs transmit and receive radio signals to
communicate with wireless devices using Wi-Fi
technology, providing wireless connectivity within a
specific coverage area or wireless network.
• WAPs are commonly used in homes, businesses, and
public spaces to create wireless networks, extend
network coverage, and support mobility for users.
• WAPs can be standalone devices or integrated into
other networking equipment such as routers, switches,
or wireless controllers.
COMMON NETWORK ENVIRONMENTS

•Internet
•Intranet
•Extranet
INTERNET
• The Internet is a vast network that connects
computers all over the world.
• Through the Internet, people can share
information and communicate from anywhere with
an Internet connection.
• The internet allows people more affordable and
efficient access to basic amenities such as
education, health care, public safety, and
government services

• Examples where the Internet is used:

 Social media and content sharing.


 Email and other forms of communication, such as
Internet Relay Chat, internet telephony, instant
messaging and video conferencing.
INTRANET
• An intranet is a private network contained within
an enterprise that is used to securely share
company information and computing resources
among employees.
• An intranet can also be used for working in
groups and teleconferences.
• They let employees easily access important
information, links, applications, forms and
databases of company records

• Examples where the Internet is used:

 Members of an organization.
 A website that an airline company exclusively uses
to deliver updates and information to its
workforce.
EXTRANET
• An extranet is an organization’s private network
and its available only for selected users.
• It’s a way to connect to third parties like vendors,
customers, and partners in a secure and
controlled way.
• Extranet in simple terms provides a secure
network for an organization to share information
with relevant people outside the organization.

• Examples where the Internet is used:

 Manufacturing.
 Logistics and Distribution.
CLOUD COMPUTING
Benefits: What is it:
• Scalability: Cloud services allow users to • Cloud computing is the on-demand
easily scale resources up or down based on delivery of computing services such as
demand. servers, storage, databases, networking,
software, and analytics.
• Cost-effectiveness: Cloud computing
• Cloud-based storage makes it possible to
eliminates the need for large upfront
investments in hardware and save files to a remote source.
infrastructure. • Cloud data storage platforms include
Google Drive, Dropbox, OneDrive, and
Box.
Disadvantages:
• Dependency on Internet Connectivity: Cloud
computing relies heavily on internet
connectivity.
• Security and Privacy Concerns: Despite
advancements in security measures,
concerns about data security and privacy
persist. Entrusting sensitive data to third-
party cloud providers raises questions
about data breaches.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy