Skip to main content

Types of Networks




In describing the basics of networking technology, it will be helpful to explain the different types of networks in use.

Local Area Networks (LANs)

A network is any collection of independent computers that exchange information with each other over a shared communication medium. Local Area Networks or LANs are usually confined to a limited geographic area, such as a single building or a college campus. LANs can be small, linking as few as three computers, but can often link hundreds of computers used by thousands of people. The development of standard networking protocols and media has resulted in worldwide proliferation of LANs throughout business and educational organizations.

Wide Area Networks (WANs)

Often elements of a network are widely separated physically. Wide area networking combines multiple LANs that are geographically separate. This is accomplished by connecting the several LANs with dedicated leased lines such as a T1 or a T3, by dial-up phone lines (both synchronous and asynchronous), by satellite links and by data packet carrier services. WANs can be as simple as a modem and a remote access server for employees to dial into, or it can be as complex as hundreds of branch offices globally linked. Special routing protocols and filters minimize the expense of sending data over vast distances.

Wireless Local Area Networks (WLANs)

Wireless LANs, or WLANs, use radio frequency (RF) technology to transmit and receive data over the air. This minimizes the need for wired connections. WLANs give users mobility as they allow connection to a local area network without having to be physically connected by a cable. This freedom means users can access shared resources without looking for a place to plug in cables, provided that their terminals are mobile and within the designated network coverage area. With mobility, WLANs give flexibility and increased productivity, appealing to both entrepreneurs and to home users. WLANs may also enable network administrators to connect devices that may be physically difficult to reach with a cable.
The Institute for Electrical and Electronic Engineers (IEEE) developed the 802.11 specification for wireless LAN technology. 802.11 specifies over-the-air interface between a wireless client and a base station, or between two wireless clients. WLAN 802.11 standards also have security protocols that were developed to provide the same level of security as that of a wired LAN.
The first of these protocols is Wired Equivalent Privacy (WEP). WEP provides security by encrypting data sent over radio waves from end point to end point.
The second WLAN security protocol is Wi-Fi Protected Access (WPA). WPA was developed as an upgrade to the security features of WEP. It works with existing products that are WEP-enabled but provides two key improvements: improved data encryption through the temporal key integrity protocol (TKIP) which scrambles the keys using a hashing algorithm. It has means for integrity-checking to ensure that keys have not been tampered with. WPA also provides user authentication with the extensible authentication protocol (EAP).
Wireless Protocols
Specification
Data Rate
Modulation Scheme
Security
802.11
1 or 2 Mbps in the 2.4 GHz band
FHSS, DSSS
WEP and WPA
802.11a
54 Mbps in the 5 GHz band
OFDM
WEP and WPA
802.11b/High Rate/Wi-Fi
11 Mbps (with a fallback to 5.5, 2, and 1 Mbps) in the 2.4 GHz band
DSSS with CCK
WEP and WPA
802.11g/Wi-Fi
54 Mbps in the 2.4 GHz band
OFDM when above 20Mbps, DSSS with CCK when below 20Mbps
WEP and WPA

Comments

Popular posts from this blog

Download Sample Paper Of Cyber Security & Cyber Laws - Delhi Polytechnic - B.T.E Delhi

Cyber Security & Cyber Law Cyber Security & Cyber Law Cyber Security & Cyber Law

Download Sample Paper E-Commerce & M-Commerce - BTE Delhi- Delhi Polytechnic

Server Benefits

#1 File and Network security The most important role of a file server is the network security it provides. By creating individual user and group accounts, rights can be assigned to the data stored on the network preventing unauthorized users from accessing materials they shouldn't be viewing. For example, the sales team doesn’t need access to employee personal records which should only be accessible by HR. #2 Increased reliability; decreased workflow interruptions Many servers are equipped with redundant power supplies. With a secondary power supply running in tandem, the loss of one of the power supplies doesn't affect normal system operations. The same goes for a server's storage system. Unlike an average desktop PC that uses a single hard drive, a server will typically use multiple hard drives working in a RAID configuration to prevent data loss or an interruption in workflow. In addition, many servers are also equipped with hot swappable hard drives and