What are the types of the computer network in computer technology?

What are the types of the computer network in computer technology?

A computer network is a group of computers or devices that resemble computers that are connected to one another. In order to exchange network resources including files, data, software, printers, and network services, among other things, Users access information via workstation computers (also called clients, desktops, or clients) that run client operating systems like Windows 7, Windows 8, Windows 8.1, or Windows 10 and save their data on a central networked file server in a typical computer network.

Computer networks operating at 10 Gbps (Gigabits per second) are gaining popularity. Additionally, very fast networks have a high level of redundancy. If a path to a destination loses, another path finds and launches if it is still possible. In addition, to file transfers and printing, today’s computer networks design to handle a variety of traffic types, including audio, video, and torrents.

Computer networks require network communication and resource sharing (printers, scanners, storage spaces, etc.). A computer network must build and connected using computers (both clients and servers) and specialised networks infrastructure hardware such as switches, routers, firewalls, and servers.

Personal area network (PAN):

A network that connects electronic devices in a user’s immediate neighbourhood is known as a personal area network (PAN). A PAN can range in length from a few millimetres to many metres. One of the most well-known real-world examples of a PAN is the connection between a Bluetooth earpiece and a smartphone. PANs may be used to link a variety of digital devices, including laptops, tablets, printers, keyboards, and others.

PAN network connections can be wired or wireless. The most popular wireless connection technologies are Bluetooth, WiFi, IrDA, and Zigbee, whereas USB and FireWire are wired connection methods. While devices inside a PAN can communicate with one another, most PANs don’t have routers, making it impossible for them to directly access the Internet. On the other side, a PAN device may be connected to a LAN, which then connects to the Internet.

Local area network (LAN):

Individuals own and run local area networks, or LANs, which are networks. They provide end-users with a practical means of resource sharing. Other computers connected to a network may easily share printers, file servers, scanners, and the internet.

No of its size, a LAN simply differs from other computer networks by linking devices in a single, constrained area. On the other hand, a wide area network (WAN) or metropolitan area network (MAN) covers a larger geographic area. WANs and MANs link a large number of LANs.

Cables, access points, switches, routers, and other parts make up a local area network (LAN), which uses a wide area network to connect devices to internal servers, web servers, and other LANs.

The introduction of virtualization has helped virtual LANs, which allow network managers to conceptually organise network nodes and divide their networks without needing to make significant infrastructure upgrades.

Wireless local area network (WLAN):

Devices can connect to and communicate wirelessly through a network called a WLAN (wireless local area network). WLAN devices communicate using Wi-Fi as opposed to a traditional wired LAN, which connects devices using Ethernet connections.

A WLAN looks different from a standard LAN, yet it serves the same purposes. To add and configure additional devices, DHCP frequently utilisez. Similar to how wired devices can, they can link to other network devices. The way that data conveys differs significantly. Data send across physical cables in a LAN via a series of Ethernet packets. In a WLAN, packets are broadcast over the air.

Along with wireless devices, WLANs have become more and more popular. In actuality, sales of routers are presently dominated by wireless routers. Any Wi-Fi-enabled device within the router’s wireless signal range can connect wirelessly as the router serves as a base station.

Metropolitan area network (MAN):

A metropolitan area network (MAN) is a computer network that is larger than a local area network (LAN) for a single building but smaller than a wide area network due to its geographic location (WAN). Numerous LANs connect through dedicated backbone connections. It may also refer to a municipality’s or an area’s public networking infrastructure.

A metropolitan area network (MAN) is a private data network that is utilised by a single organisation across a number of buildings or by several organisations within the same geographical area. Although it is larger than a LAN for a single building, a WAN cannot be used to describe it. Typically, the size ranges from 5 to 50 kilometres. A group of structures on a single, continuous plot of land is another way to describe a campus network.

Campus area network (CAN):

A network that covers an academic or commercial campus knows as a campus area network (CAN). Examples include kindergartens, college campuses, and office buildings.

A campus area network is bigger than a local area network LAN since it may include several buildings in a specific region. The majority of CANs consist of many LANs connected by switches and routers to create a single network. Similar to how LANs work, users with network access—wired or wireless—can connect directly with other computers on the network.

A college or university referres to as a “residential network” or “ResNet” since it could only access by campus residents, such as students and employees.

Wide area network (WAN):

A large computer network that is not connected to a single location is known as a wide area network (also known as WAN). WANs may enable communication, information sharing, and much more between devices all over the world through a WAN provider.

WANs are essential for global corporations since the internet is the biggest WAN in the world, but they also require regular usage.

These networks create by service providers and lease to institutions including corporations, universities, and government agencies. These clients can utilise the network to relay and store data or communicate with other users regardless of where they are as long as they have access to the established WAN. You can connect through telephone lines, wireless or cellular networks, virtual private networks (VPNs), or the internet.

WANs enable international businesses to quickly complete crucial daily tasks. To exchange data, collaborate, or just stay connected to the company’s larger data resource centre, employees from all over the world can connect to a company’s WAN. Certified network professionals that assist businesses are in charge of maintaining wide-area networks and other crucial IT infrastructure.

Wan, Man, Lan, Vpn, Can, San, and other types of networks exist in computers.

Storage area network (SAN):

An example of a high-speed computer network or subnetwork in computing is a storage area network (SAN), which links several computers and provides shared storage pools for those systems.

The ability of a company to obtain and store data is essential. For many business applications, direct-attached disc installations within servers can be a less expensive option, but the discs and the crucial data they hold must link to the real server using a specialised connection, such as SAS (Serial Attached Storage). Modern corporate computers occasionally need a lot more structure, flexibility, and control. These worries led to the creation of the storage area network.

SAN technology is the solution for high-performance storage. It connects a sizable number of servers to several storage options. Then, storage could manage and arrange using a layer or pool approach. While technologies like data deduplication and RAID can enhance storage capacity while enhancing storage resilience, an organisation may view storage as a single collective resource that can centrally replicate and protect (DAS).

Storage availability can also improve with a storage area network (SAN). A network path interruption may typically avoid by offering a different route across the SAN fabric since a SAN is essentially a network fabric of linked computers and storage devices. As a consequence, storage is still accessible to business applications even if one cable or piece of equipment malfunctions. By eliminating “forgotten” discs from underutilised servers, the choice to view storage as a shared resource also promotes increased storage consumption. On the other hand, a SAN offers a single location for all storage and enables administrators to pool and manage every storage device at once.

System area network (SAN):

A system area network (SAN) is a high-performance, connection-oriented network that may link a number of systems. A storage area network (SAN) offers low latency and high bandwidth (at least 1 Gbps). A SAN often switches using hubs that support eight or more nodes. A SAN’s node-to-node distance might range from a few metres to several kilometres.

With a SAN, data deliveries in the same order as it transferred, in contrast to traditional network technologies like Ethernet and ATM. In order to send data using the TCP/IP protocol stack in a SAN, connection endpoints are not necessary unless traffic must route between subnets. For SAN-local communication, the TCP/IP protocol layer can skip by using a native SAN transport.

A SAN network interface controller (NIC), a transport driver for the SAN NIC, or a combination of the two can provide a private transport interface. However, because most networking programmes design to use TCP/IP through Windows Sockets, they cannot directly access a SAN.

There are different types of networks PAN, LAN, WLAN, CAN, MAN, WAN, SAN, etc.

Electronic payment network (EPN):

An “Electronic Payments Network” is a financial clearinghouse that deals with various private-sector electronic money transactions (EPN). It is one of the automated clearinghouses (ACHs) in the US, along with the Reserve Banks. Money can transfer between accounts at the same or other financial institutions using the EPN. EPN transfers include debit transfers such as loan payments and insurance premiums as well as deposits for salary, Social Security benefits, and tax refunds.

To speed up the electronic transfer of money from one account to another, financial institutions can use the automated clearinghouse (ACHs) network to carry out bulk electronic transfers—either credit or debit transactions. The two systems in use in the US are the Federal Reserve Bank and the Electronic Payments Network. All ACH transactions in the nation manage by these two platforms. Even while the network to design to manage regular payments, it now also allows one-time debit transfers, such as those done over the phone or online.

Due to their simplicity, convenience, and security, ACH payments favourite by both individuals and businesses. For instance, the EPN is virtually probably a crucial element of most businesses’ direct-payroll payments. Which does away with the requirement that employees visit the bank to deposit their paychecks.

Since ACH payments have a shorter processing time and cheaper fees. Then checks and credit cards, are the best choice for recurring invoicing.

You may transmit and receive data across several devices using various sorts of computer networks.

Virtual private network (VPN):

A device connects to a computer network over the Internet via an encrypted connection known as a virtual private network or VPN. Sensitive data may transfer safely thanks to the encrypted connection. It permits remote operation and protects against illegal traffic eavesdropping. In business contexts, VPN technology employees.

A virtual private network (VPN) connects a company network to the Internet via secure connections. Data protects during transit thanks to the encryption used between the device and the network. Using a secure VPN connection, a worker may safely access the company’s network while working from home. Mobile devices like smartphones and tablets can connect to the internet using a VPN as well.

A company network may access safely and securely by means of secure remote access for both people and equipment. Strong authentication procedures for the user or device include, as well as VPN technology. VPN technology may determine if a device satisfies certain requirements (referred to as a device’s posture) before allowing it to connect remotely.         

Leave a Reply

Your email address will not be published. Required fields are marked *