Computer Science

Types of Network

In computer science, networks can be categorized into different types based on their geographical scope and the way they are structured. Local Area Networks (LANs) cover a small area, such as a single building, while Wide Area Networks (WANs) span larger geographical areas. Other types include Metropolitan Area Networks (MANs), Personal Area Networks (PANs), and Virtual Private Networks (VPNs), each serving specific connectivity needs.

Written by Perlego with AI-assistance

7 Key excerpts on "Types of Network"

Index pages curate the most relevant extracts from our library of academic textbooks. They’ve been created using an in-house natural language model (NLM), each adding context and meaning to key research topics.
  • Cyber Careers
    eBook - ePub

    Cyber Careers

    The Basics of Information Technology and Deciding on a Career Path

    • Pee Vululleh(Author)
    • 2022(Publication Date)
    • CRC Press
      (Publisher)

    ...The protocols defined are standard and followed by everyone who needs to set up a network. The software is the driving force that instructs all network components to operate together. 4.3 Types of Networks While many Types of Networks exist, the two main categories are Local Area Network (LAN) and Wide Area Network (WAN). Let’s consider these in turn. 4.3.1 Local Area Network A Local Area Network (LAN) connects a small number of computer systems in a relatively close geographical area. In other words, a LAN is limited to a specific location, such as a home, office, or building. A single router may be used in a home network to offer connections. For example, a hardware (computer) may connect to the router via Ethernet, while smartphones connect through Wi-Fi. All connected devices share the same network and often the same internet connection. A more extensive network, such as an educational institution’s network, may comprise many switches and Ethernet cables. This type of network is still considered a LAN because of its limited specificity. The nodes are independent but are all connected via the LAN. Switches and routers are part of the devices that allow a LAN device to interconnect them with each other. In a LAN, connected computers have a Network Operating System (NOS) installed onto them. One computer is designated as the file server that stores all the software controlling the network. It also stores the software that can be shared by the computers attached to the network. Other computers connected to the file server are called workstations. The workstations can be less powerful than the file server, and they may have additional software on their hard drives. LANs allow computers to share resources, access each other’s data files, and even control one computer via another. LAN has been the driving force of Internet of Things technology...

  • Network Technology for Digital Audio
    • Andy Bailey(Author)
    • 2013(Publication Date)
    • Routledge
      (Publisher)

    ...The computers on a network may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams. There are many ways of categorizing networks, and one of these is by the geographical area covered by the network. In information systems (IS), the basic categories in this case include: local area network (LAN) metropolitan area network (MAN) wide area network (WAN) A LAN is generally installed within a single building or campus, whereas a WAN extends the concept to cover connections between towns, cities, and countries. A MAN is a newer term that can have two possible variations on meaning. The first is a network installed internally to an organization, where the parts of the organization remain within a municipal area. The second interpretation is a high capacity general network, offered as a service within a town or city, probably connecting to the Internet. Each of these Types of Network needs to consider different design aspects. In network terms, a station is considered to be a computer, whereas a node may also be a network element, such as a router or bridge. Routers, bridges, and other network elements are covered in later chapters. More recently, other network abbreviations have become popular, such as SAN, for storage area network, and CAN, for controller area network (often associated with the automobile industry). Those that are pertinent to the transfer of audio are covered in more detail in later chapters. 1.5  Why do we Need to Move Digital Audio Data Around? In order for the full benefit of digital audio to be realized, the digital domain can be extended into the consumers’ home. The signal may be broadcast, or the digital data stored on a medium and purchased in retail outlets – such as purchasing a CD. No matter how the data are moved, the receiving device must correctly interpret the digital information, otherwise the resulting ‘audio’ may not be at all desirable...

  • Microelectronics
    eBook - ePub
    • Jerry C. Whitaker(Author)
    • 2018(Publication Date)
    • CRC Press
      (Publisher)

    ...The challenge of internetworking is in getting departmental LANs of different protocol stacks (as determined by use of the OSI model) to talk to each other, while only allowing authorized users access to the internetwork and other LANs. Variations of internetworking also deal with connecting LANs to mainframes or minicomputers rather than to other LANs. •  Wide area networking: Also known as enterprise networking, involves the connection of computers, network nodes, or LANs over a sufficient distance as to require the purchase of wide area network (WAN) service from the phone company or alternative carrier. In some cases, the wide area portion of the network may be owned and operated by the corporation itself. Nonetheless, the geographic distance between nodes is the determining factor in categorizing a wide area network. A subset of WANs known as metropolitan area networks (MANs) are confined to a campus or metropolitan area of usually not more than a few miles in diameter. The important thing to remember is that categorization of networking is somewhat arbitrary and that what really matters is that the proper networking technology (hardware and software) is specified in any given networking opportunity in order to meet stated business objectives. 22.2 Personal Remote Connectivity Applications The overall methodology for analysis and design of remote connectivity networking can be summarized as follows: 1.  Needs analysis 2.  Logical topology choice 3.  Physical topology or architecture choice 4.  Technology review and specification Remote Connectivity Needs Analysis Remote connectivity needs analysis involves documenting the nature and extent of the use of local LAN resources by the remotely connected user. Choices of logical or physical topology for this remote LAN connectivity may be limited depending on the outcome of the remote connectivity needs analysis...

  • The Construction Technology Handbook
    • Hugh Seaton(Author)
    • 2020(Publication Date)
    • Wiley
      (Publisher)

    ...CHAPTER 3 Software Networks Types of Networks Modern software almost always exists as part of a network, often more than one. There are five types of computer networks that most users should be aware of, and understand to some degree: the internet; Wi‐Fi; cellular; satellite; and API networks. Each of these works differently, does different things for you, and has different risks that are worth understanding. The Internet The internet is not very new, having been created by universities for the defense department in the 1960s. The internet is the ultimate open standard, and is based on some very loose rules about how to name things, how to send things from point to point, and a system of finding things anywhere in the world. The internet does some of this magic via internet protocol (IP), which gives hardware its “address” on the network. In fact, these are called “IP addresses,” and the latest version of the internet protocol is sometimes referred to as IPv6 (it's version 6). There is nothing inherently secure about the internet, any more than there is anything safe about a highway or side road. If you're not a software developer, there is also nothing that you can see about the internet itself, as it has no graphical interface. So the likelihood of your having to do very much with the internet directly is pretty low. In Chapter 2, we discussed how the internet became accessible beyond software engineers in 1994 with the release of, first, the Mosaic browser, then Netscape. These software tools were based on an innovation from an English computer scientist, Tim Berners‐Lee. He had created a file management system called “hypertext transfer protocol,” which is what makes the web work...

  • Cybercrime and Information Technology
    eBook - ePub

    Cybercrime and Information Technology

    Theory and Practice: The Computer Network Infostructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices

    • Alex Alexandrou(Author)
    • 2021(Publication Date)
    • CRC Press
      (Publisher)

    ...Additionally, routers protect information from outside security threats by enabling firewalls and acting like a fence between the Internet and computer devices, blocking any information requests from the Internet. The computer architecture describes the functionality, the physical and logical framework, and how devices are organized in a computing network. Figure 5.41 illustrates a typical LAN Network. FIGURE 5.41 A typical LAN connected to the Internet. 5.7 Conclusion Network connectivity has been in a constant state of evolution, with improved virtualization of servers and data centers, the adoption of multi-cloud systems, and the improvement of networking through AI and machine learning. Machine learning will continue to improve troubleshooting by collecting relevant data, correlating them, and then being able to identify a network or application problem. Additionally, machine learning will improve network security by creating a real-time database of security threats, behavior, and detection. A final technology gaining momentum is the Software-Defined Wide Area Network (SD-WAN) that simplifies and centralizes the operation of a WAN. SD-WANs improve performance by virtualizing the WAN with centralized controls and intelligent management software, providing the network with cost-effective solutions to its problems. In wireless networking, 5G wireless network technology, Wi-Fi 6 and Mesh networking will soon change how we access the Internet...

  • CRC Handbook of Local Area Network Software
    eBook - ePub
    • Paul L. Fortier(Author)
    • 2018(Publication Date)
    • CRC Press
      (Publisher)

    ...1 INTRODUCTION TO LOCAL AREA NETWORKS Local area networks (LANs) continue to grow in popularity, as evidenced by the many new LAN products and the publicity related to them. Numerous classroom courses on the subject are offered as well as conferences and sessions dedicated to them. The draw is the promise of using LANs to interconnect various computers and resources into a unified system with more power and performance than is available from conventional nondistributed approaches. Potential users of local area networks want to share information and programs, have increased computing power, or get at specified equipment. A LAN must provide services and interfaces compatible with a wide array of user requirements based on intended use. A LAN needs to be more than just a wire and connection mechanism. It must provide upper-level services to users that aid in their overall applications, design, development, and use—as do today’s operating systems. This class of service is the next great development opportunity. The lowest-level communications equipment and protocols are standardized and readily available off the shelf, but the upper-layer software is not so readily available. There is great opportunity for the company that can provide products for the upper-layer needs. How did we get where we are today? How did networks evolve? Basically, system designers have used four techniques to interconnect computer equipment. They are: 1.  Centralized 2.  Decentralized 3.  Distributed 4.  Networked Figure 1-1 Centralized Computer Interconnect. A centralized interconnect environment is a self-contained system capable of autonomous operation (Figure 1-1). A centralized interconnect exhibits a master/slave relationship between the CPU and the attached devices. The attached devices are typically strung off the I/O bus of the computer. Data is transferred in data blocks via direct address, using the centralized computer system’s operating system synchronization and timing mechanisms...

  • Telecommunications
    eBook - ePub

    Telecommunications

    A Handbook for Educators

    • Resa Azarmsa(Author)
    • 2013(Publication Date)
    • Routledge
      (Publisher)

    ...The bridge allows data to be sent off on one network and onto the other so that terminals on both networks can communicate as though a single network existed. If two networks operate according to different protocols, a device called a gateway is used to connect them. The gateway translates the protocols in order to allow computers on the two networks to communicate. Gateways may also provide the translation between the media and electrical specifications of two-device network. Wide Area Network (WAN) The wide area network (WAN) systems are too separated, either physically or geographically, to be included in a small inhouse network. In other words WANs corner a much larger geographical area throughout than a LAN. They usually require the crossing of public rights of way, and use a common carrier (telephone company). A common carrier is a governmentregulated private company that furnishes the general public with communication facilities. The most noted examples of common carriers are AT&T, the Bell operating companies, US Sprint, MCI and so forth. WAN’s use a broad range of communication media for interconnection and can be located as close together as a few blocks or as far away as another country. They generally use transmission media, such as microwave or satellite transmission, but they are not limited to these two forms. Figure 5.5. Hybrid Network Local Area Wireless Network Most LANs are formed with a blend of twisted part wires (telephone wire), fiber optic cable, and coaxial cable. Local Area Wireless Network is another form of network topology. The idea of wireless LAN comes from cellular mobile phones in which geographical areas are divided into hexagonally shaped cells, with adjacent cells having noninterfering radio frequencies. Forecasts for wireless LANs show 210 percent growth over the next three years (Clegg, 1991). There are three basic technologies used to transmit data without wire...