Recent Tube

What is Computer Networks?

A Computer Network refers to interconnected devices such as computers, servers, printers, and other communication devices. The purpose of computer networks is to enable the sharing of resources and information between devices.


There Are Several Types of Computer Networks, including :


LAN (Local Area Network): 


This network connects devices within a local area, such as a home, office, or building. LANs are typically used for sharing files, printers, and other resources. An example of a LAN would be a small office with several computers and a printer connected through a wired or wireless network. In this scenario, employees in the office can share files, use the printer, and access the internet through a single internet connection. This enables the office to function more efficiently as the employees can easily collaborate and share resources.


WAN (Wide Area Network): 


This network connects devices across a large area such as a city, country, or even globally. WANs are typically used for connecting multiple LANs. Examples of WANs include mobile broadband networks, last mile networks, IPsec VPNs, packet switching, TCP/IP protocol suites, SD WANs, routers, overlay networks, packet over SONET/SDH, MPLS (Multiprotocol Label Switching), frame relay, ATM (Asynchronous Transfer Mode). In addition, WANs connect Internet of Things (IoT) devices for interconnectivity between local area networks and submarine fiber connections interconnecting continents. 


WLAN (Wireless Local Area Network): 


This LAN uses wireless technology to connect devices instead of wired ones. In a WLAN, devices such as laptops, smartphones, and tablets are connected to a wireless access point (WAP), typically connected to a wired network. The WAP bridges the wireless devices and the wired network, enabling communication between them.WLANs offer advantages over wired networks, such as mobility, convenience, and flexibility. For example, users can move around and connect to the network from different locations within the coverage area without cables or wires. WLANs also allow for easy expansion and reconfiguration, as new devices can be added or removed from the network without needing rewiring.


MAN (Metropolitan Area Network): 


This network connects devices within a metropolitan area like a city. One of the main advantages of a MAN is that it provides high-speed connectivity to a large extent, which can help to improve productivity and efficiency for businesses and organizations. MANs can also support various applications and services like video conferencing, online collaboration, and cloud computing. Examples of MANs include large corporate networks that span multiple office buildings or branches within a city and municipal networks that provide internet access to residents and businesses within a city or town. MANs are also used by universities, hospitals, and other large institutions to connect multiple campuses or facilities in a city or metropolitan area.


CAN (Campus Area Network): 


This network connects devices within a campus, such as a university or a college. An example of a CAN is the University of California, Los Angeles (UCLA) campus network, one of the world's largest and most complex university networks. The network connects over 400 buildings across a 419-acre campus, serving over 80,000 students, faculty, and staff. The UCLA CAN consists of high-speed fiber-optic cables, wireless access points, and network switches that provide connectivity to various devices such as computers, printers, phones, and other network-enabled devices.

The UCLA CAN is designed to support various applications and services such as email, web browsing, video conferencing, online learning, and research collaboration. The network also provides advanced security features such as firewalls, intrusion detection, and data encryption to protect sensitive information and prevent unauthorized access.

The UCLA CAN is managed by the UCLA Office of Information Technology (OIT), which provides 24/7 monitoring, maintenance, and support to ensure the network is always available and performs optimally. OIT also works closely with various departments and stakeholders to identify their network requirements and provide customized solutions to meet their needs.


SAN (Storage Area Network): 


This network provides access to data storage devices such as disk arrays and tape libraries.

One example of a SAN is the one used by the financial services company Wells Fargo. Wells Fargo is one of the largest banks in the United States, with over 7,200 locations and 70 million customers. As a result, the company requires a highly reliable and scalable storage solution to ensure the security and availability of customer data.


Wells Fargo's SAN contains over 14 petabytes of storage capacity and is designed to support a wide range of applications and services, such as online banking, mobile banking, and transaction processing. The SAN is built on a Fibre Channel (FC) network, which provides high-speed data transfer rates and low latency.


The SAN consists of redundant storage arrays, switches, and controllers to ensure high availability and minimize downtime. The SAN also utilizes advanced data protection and security features such as encryption, zoning, and access control to secure sensitive financial data.


Wells Fargo's SAN is managed by a team of storage administrators who monitor and manage the storage infrastructure 24/7. The administrators use specialized storage management software to allocate and manage storage resources, monitor performance, and troubleshoot issues.


In addition to Wells Fargo, many other large companies and organizations use SANs to meet their storage requirements. These include healthcare organizations, government agencies, and research institutions. SANs are also used in the media and entertainment industries to store and manage large amounts of video and audio content.


Computer networks can be designed using different types of topologies, including:


Bus Topology: 


This is a topology in which devices are connected to a single cable.


Star Topology: 


Let`s Talk about the Star Topology is a network topology where all devices are connected to a central hub or switch. This central hub or switch acts as a mediator for all data communication between devices on the network. In a Star Topology, each device on the web is connected to the central hub with a separate cable.

An example of a Star Topology is a home network where all devices, such as computers, printers, and smartphones, are connected to a central router. The router acts as the central hub; all devices are connected to it with a separate cable or wirelessly through Wi-Fi. The router then facilitates communication between devices on the network, allowing them to share data and resources.

One of the benefits of a Star Topology is that it is easy to add or remove devices from the network. Since each device is connected to the central hub separately, adding a new device by clicking it on the seat is straightforward. Similarly, removing a device is as simple as unplugging the cable from the hub.

However, a disadvantage of a Star Topology is that it can be expensive to implement since each device requires its cable to connect to the central hub. Additionally, the entire network will be affected if the central hub fails since all communication between devices relies on the corner.


Ring Topology: 


A Ring Topology is a network topology where all devices are connected in a circular loop. In a Ring Topology, each device on the network is connected to the next device in the loop, and the last device is connected to the first device to complete the circle.

An example of a Ring Topology is a token-ring network, a general network topology in the 1980s and 1990s. All devices are connected in a circular loop in a token-ring network, and data is successively transmitted around the circle. For example, each device on the web is given a token, an individual data packet passed around the loop from device to device. A machine can transmit data onto the network when it has the ticket. Once the data has been shipped, the token is passed to the next device in the network.

One of the benefits of a Ring Topology is that it is easy to implement and maintain since all devices are connected in a simple loop. Additionally, since data is transmitted sequentially around the circle, no collisions or packets get lost in transit.

However, a disadvantage of a Ring Topology is that it can be slow to transmit data since each device on the network must wait for the token to be passed to it before it can transmit data. Additionally, the entire network can be affected if one device fails since data cannot be shared around the loop. Finally, adding or removing widgets from the web can be difficult since the circle must be broken to connect or disconnect a device.


Mesh Topology: 


The Mesh Topology is a network topology where all devices are connected in a decentralized manner, forming a network of multiple interconnections. For example, in a Mesh Topology, each device on the web is connected to several other devices, creating multiple paths for data to travel between devices.

An example of a Mesh Topology is a wireless mesh network, such as a Wi-Fi mesh network. In a Wi-Fi mesh network, multiple wireless access points are placed throughout a building or area, each connected to other access points to create a mesh network. Devices on the web can connect to any of the access points, and data can travel between devices through multiple paths instead of relying on a single route between devices.

One of the benefits of a Mesh Topology is that it is highly resilient and fault-tolerant since data can travel multiple paths between devices. If one approach fails, data can be rerouted through another route. Additionally, adding or removing widgets from the network is easy since each device is connected to several other appliances.

However, a disadvantage of a Mesh Topology is that it can be expensive to implement since each device on the network requires multiple connections to other devices. Additionally, it can be challenging to manage and maintain, especially in more extensive networks with many devices.


Computer networks use protocols such as TCP/IP, HTTP, FTP, and SMTP to enable communication between devices.


In conclusion, computer networks enable sharing of resources and information between devices. Different types of computer networks, topologies, and protocols are used to create and manage computer networks.

Post a Comment

0 Comments