Monday, December 13, 2021

What is HTML?

What is HTML? :- The simplest way to learn what is HTML is with Shahzad Academy. Become a master of Hypertext Markup Language with our tutorial.

What is HTML? :- The simplest way to learn what is HTML is with Shahzad Academy. Become a master of Hypertext Markup Language with our tutorial.

The short explanation: Hyper Text Markup Language or HTML is a language that communicates with our web browser, it dictates the structure of each page on the World Wide Web. It tells the browser how to interpret data to form elements on a website. 

The long explanation: Well that is going to take some time. :) Let’s break it down in 5 chapters:

  • History of HTML
  • How does an HTML look like
  • Basic HTML template
  • What is an HTML tag
  • What is HTML 5
  • Future of HTML

History of HTML
Enquire
A guy named Tim Berners-Lee worked as a freelancer at CERN. In the short time that he worked there, he came up with a plan that would optimize communication between scientists at CERN. Especially the sharing of documents between researchers. This system was called ENQUIRE, and it was the predecessor of the WEB as we know it today. For instance, try to imagine a poorly styled Wikipedia page full of links and you will get the basic idea how ENQUIRE looked liked. 

HTML
Fast forward 10 years later and the same guy developed a web browser and specified HTML for the first time. At this time this was still only available to academic institutions. But only one year later it was made available to the general public. YES, the stories of the World Wide Web and of the Hyper Text Markup Language go hand in hand, as one cannot exist without the other. In fact we could easily change the question from what is HTML to what is WWW. 

It was in 1999 with the HTML 4 standard that the markup language started to concern itself not only with providing information but how the presentation of that information should look. This was when websites got some style. The style was defined within each element in the HTML. In fact, it wasn’t until the HTML 5 standard where we saw the complete separation of concern. Thus, HTML defines the structure of a website, while the concern of formatting was given to CSS (Cascading Style Sheets). But don’t worry, you still have some formatting options in HTML 5.

How does an HTML look like

Below we have the basic structure of a modern HTML. In the first line, we always have the !DOCTYPE html (Document Type Declaration). “<!DOCTYPE html>” is an HTML5 declaration and the shortest Document Type Declaration you can have. This declaration tells the browser that this is an HTML type document. Next, we start with an opening html tag (in the next chapter we will explain what a tag is), this tells the browser it is reading HTML code.
Following the opening html tag is the head, this is my favorite part of the file. Since i am a marketing guy it is also one of the most important ones for me. Here we give the browser valuable information about the website. This information is not visible to a website visitor, but it is essential for making your website better for search engines. 

The head is also the part where we make connections to files that correlate with the HTML file (example: CSS file, JavaScript, fonts...). 

More importantly, this is also the place where we make the connections to Google analytics, Facebook pixel, and other tools that help us better understand our users and drive more traffic to our website.

Then comes the important part, the <body>. This part is visible to the website visitor, and here we place the content for our website, from a simple text page to an advanced interactive website, which collaborates with CSS and JavaScript. In fact, this is where we have all the content. Furthermore, we can also give additional information to this element by using attributes. However, with HTML 5 layout attributes (attributes that define the look of the whole body (example: bgcolor)) are removed. 

Finally the document ends with a closing </html> tag. What is a closing tag or should I say what is a tag anyway?

What is an HTML tag?

In addition to asking ourselves what is HTML, we have to ask what is an HTML element. Each element starts and in most cases ends with a tag. Moreover, a tag tells the browser how to format and display content. An opening tag consists of a name within angle brackets (<>), and a closing tag is the same only that before the name we have a slash (/). Some tags do not have a closing tag. For example, two of the most commonly used, are the image tag (<img>) and the break tag (<br>). 

Tags can have attributes that provide additional information about the elements. As you can see in the examples below, following the equals sign attributes are assigned a value. We add attributes in the opening tag, and they are optional for most. On the other hand, one of the exceptions is the image tag that must at least have the src attribute (the alt attribute is optional). Moreover, an image tag is an empty element because it has no content. 
The best way to learn more about tags is to get familiar with a couple of them. Take a look at our blog post where we list the top 10 HTML tags. 

Top 10 tags:
  • <a> for link
  • <b> to make bold text
  • <strong> for bold text with emphasis
  • <body> main HTML part
  • <br> for break
  • <div> it is a division or part of an HTML document
  • <h1> for titles
  • <i> to make an italic text
  • <img> for images in document
  • <ol> is an ordered list, <ul> for an unordered list
  • <li> is a list item in bulleted (ordered list)
  • <p> for paragraph
  • <span> to style part of text
What is HTML 5

HTML 5 is the latest standard of HTML; its specifications were published on October 28, 2014. The main focus or should I say purpose is to use HTML for the same reasons as in the beginning, the structure of content. It wishes to separate itself from the styling part completely and persuade web developers to use CSS for formatting.

Because of that, a lot of popular attributes were removed (e.g. align in the paragraph tag) and a couple of tags have been “demoted” in the HTML 5 recommendations (e.g. bold ( <b>) and italicize <i> tags). Although, browsers still support them, but with time they will be gone. 

On the other hand, HTML 5 has introduced new tags like <nav>, <header>,<footer>, <wbr>,... Besides new tags it also introduced new attributes and types for the <input> tag, attributes like form, list, required,... and types like date, time, URL, email…

Consequently HTML 5, almost forces the web developer to use CSS for all the styling of a website.

An HTML file also starts differently than before. It has a shorter Document Type Declaration. View the example below.

Future of HTML and the future of the
World Wide Web

If we are talking about HTML, we have to talk about its future. With HTML 5 we can see the complete separation of content, style and behavior (HTML, CSS and JavaScript). In addition, we also see a lot of frameworks and libraries that help us build websites faster and simpler (Angular, React, Bootstrap, jQuery..) And this is evolving with lightning speed and will continue to develop. Frameworks and libraries help you better form HTML, CSS and JavaScript; they enable you to create web apps that work in multiple browsers and multiple mobile devices. 

Here at Shahzad Academy, we believe that no matter what framework or library you choose, you have to know the basics of all three (HTML, CSS and JavaScript) to understand and modify elements of any framework and library. 

And what does the future hold for the World Wide Web? We believe that it holds endless possibilities. That is because there are numerous factors to consider:
  • User devices (mobile device)
    • We can already see that everything on the web is shifting to mobile first is some cases even to mobile only.
  • AI
  • Artificial intelligence is almost everywhere. Its influence on the WWW will be to provide users with more personalized user interfaces. Advanced intelligent chatbots are already doing this.
  • UI and UX
    • Designers and UX (user experience) experts are creating astonishing changes and improvements, thus demanding more functionalities in web development.
  • And many more....
WWW is a huge part of an industry that is growing each day. Take a look at our courses < HTML COURSE > and start learning. If you have any query about this Article please don't hesitate and Contact Us! Happy Your Day

Visit Us for more informative Articles and Video Tutorials:



Types of Network Topology

 Types of Network Topology: Types of Network Topologies are: Bus Topology, Ring Topology, Star Topology, Tree Topology, Mesh Topology & Hybrid Topology with Advantages and Disadvantages

Types of Network Topology: Types of Network Topologies are: Bus Topology Definitions Advantages of Bus Topology Disadvantages of Bus Topology Ring Topology Definitions Working of Token Passing Advantages of Ring Topology Disadvantages of Ring Topology Star Topology Definitions Advantages of Star Topology Disadvantages of Star  topology Tree Topology Definitions Advantages of Tree Topology Disadvantages of Tree Topology Mesh Topology Definitions Mesh Topology is divided into 2 categories Advantages of Mesh Topology Disadvantages of Mesh  topology Hybrid Topology Definitions Advantages of Hybrid Topology Disadvantages of Hybrid Topology

Types of Network Topology

A network topology refers to the way in which the various elements present in a communication network—such as links and nodes—are arranged. Currently, there are Six primary types of network topologies which are known as: Mesh, Ring, Star, Bus, Tree and Hybrid. To learn more about the different types of computer network topologies, continue reading.

We will Contents following Topics of Types of Network Topologies are:

  1. Bus Topology
    • Definitions
    • Advantages of Bus Topology
    • Disadvantages of Bus Topology
  2. Ring Topology
    • Definitions
    • Working of Token Passing
    • Advantages of Ring Topology
    • Disadvantages of Ring Topology
  3. Star Topology
    • Definitions
    • Advantages of Star Topology
    • Disadvantages of Star Topology
  4. Tree Topology
    • Definitions
    • Advantages of Tree Topology
    • Disadvantages of Tree Topology
  5. Mesh Topology
    • Definitions
    • Mesh Topology is divided into 2 categories
    • Advantages of Mesh Topology
    • Disadvantages of Mesh Topology
  6. Hybrid Topology
    • Definitions
    • Advantages of Hybrid Topology
    • Disadvantages of Hybrid Topology

Bus Network Topology

A bus topology orients all the devices on a network along a single cable running in a single direction from one end of the network to the other—which is why it’s sometimes called a “line topology” or “backbone topology.” Data flow on the network also follows the route of the cable, moving in one direction.
The bus topology is designed in such a way that all the stations are connected through a single cable known as a backbone cable. Each node is either connected to the backbone cable by drop cable or directly connected to the backbone cable.
When a node wants to send a message over the network, it puts a message over the network. All the stations available in the network will receive the message whether it has been addressed or not.
  • The bus topology is mainly used in 802.3 (ethernet) and 802.4 standard networks.
  • The configuration of a bus topology is quite simpler as compared to other topologies.
  • The backbone cable is considered as a “single lane” through which the message is broadcast to all the stations.
  • The most common access method of the bus topologies is CSMA (Carrier Sense Multiple Access)
In a bus network topology, every device in the network is connected to a single main cable through drop lines. This network topology transmits data in a single direction from one end of the cable to the other. Bus network topologies are cost-effective, easy to understand, and often used in small networks. However, if the main cable fails, the entire network will fail, and fault detection is often difficult.
  • All the nodes connect directly to a main cable which acts as a backbone for the network.  At the end of the cable is a “terminator”, which prevents signals from bouncing off the end of the cable.
  • Usually a 10 base 5 network where computers connect with “T” connectors
  • All signals are sent as a broadcast.   It travels down back bone and goes to each end point
  • One of the computers in the network typically acts as the computer server.
Advantages of Bus Topology

Bus topologies are a good, cost-effective choice for smaller networks because the layout is simple, allowing all devices to be connected via a single coaxial or RJ45 cable. If needed, more nodes can be easily added to the network by joining additional cables.
  • Low-cost cable: In bus topology, nodes are directly connected to the cable without passing through a hub. Therefore, the initial cost of installation is low.
  • Moderate data speeds: Coaxial or twisted pair cables are mainly used in bus-based networks that support upto 10 Mbps.
  • Familiar technology: Bus topology is a familiar technology as the installation and troubleshooting techniques are well known, and hardware components are easily available.
  • Limited failure: A failure in one node will not have any effect on other nodes.
  • It is easiest to set up and connect to  computer or peripheral device.
  • The cable requirements are relatively small, resulting in lower cost.
Dis-Advantages of Bus Topology

However, because bus topologies use a single cable to transmit data, they’re somewhat vulnerable. If the cable experiences a failure, the whole network goes down, which can be time-consuming and expensive to restore, which can be less of an issue with smaller networks.

Bus topologies are best suited for small networks because there’s only so much bandwidth, and every additional node will slow transmission speeds. Furthermore, data is “half-duplex,” which means it can’t be sent in two opposite directions at the same time, so this layout is not the ideal choice for networks with huge amounts of traffic.
  • Extensive cabling: A bus topology is quite simpler, but still it requires a lot of cabling.
  • Difficult troubleshooting: It requires specialized test equipment to determine the cable faults. If any fault occurs in the cable, then it would disrupt the communication for all the nodes.
  • Signal interference: If two nodes send the messages simultaneously, then the signals of both the nodes collide with each other.
  • Reconfiguration difficult: Adding new devices to the network would slow down the network.
  • Attenuation: Attenuation is a loss of signal leads to communication issues. Repeaters are used to regenerate the signal.
  • It is of limited length.
  • All nodes could see all packets on the network.
  • If one node goes down, the network goes down as it is if you broke the circuit.
Ring Network Topology

A Ring Topology includes devices that are each connected to two neighboring devices. Because the last device is connected to the first, the topology forms a circle, or ring. To send data to other devices in the network, the data must be sent in one direction. Each device has a repeater so that it can forward the data until it reaches the intended device. A ring topology is typically easy to install, scalable, and redundant.
Ring topology is where nodes are arranged in a circle (or ring). The data can travel through the ring network in either one direction or both directions, with each device having exactly two neighbors.
  • Ring topology is like a bus topology, but with connected ends.
  • The node that receives the message from the previous computer will retransmit to the next node.
  • The data flows in one direction, i.e., it is unidirectional.
  • The data flows in a single loop continuously known as an endless loop.
  • It has no terminated ends, i.e., each node is connected to other node and having no termination point.
  • The data in a ring topology flow in a clockwise direction.
  • The most common access method of the ring topology is token passing.
Token Passing: It is a network access method in which token is passed from one node to another node.

Token: It is a frame that circulates around the network.

Working of Token Passing:
  • A token moves around the network, and it is passed from computer to computer until it reaches the destination.
  • The sender modifies the token by putting the address along with the data.
  • The data is passed from one device to another device until the destination address matches. Once the token received by the destination device, then it sends the acknowledgment to the sender.
  • In a ring topology, a token is used as a carrier.
Advantages of Ring Topology

Since each device is only connected to the ones on either side, when data is transmitted, the packets also travel along the circle, moving through each of the intermediate nodes until they arrive at their destination. If a large network is arranged in a ring topology, repeaters can be used to ensure packets arrive correctly and without data loss.

Only one station on the network is permitted to send data at a time, which greatly reduces the risk of packet collisions, making ring topologies efficient at transmitting data without errors. By and large, ring topologies are cost-effective and inexpensive to install, and the intricate point-to-point connectivity of the nodes makes it relatively easy to identify issues or misconfigurations on the network.
  • Network Management: Faulty devices can be removed from the network without bringing the network down.
  • Product availability: Many hardware and software tools for network operation and monitoring are available.
  • Cost: Twisted pair cabling is inexpensive and easily available. Therefore, the installation cost is very low.
  • Reliable: It is a more reliable network because the communication system is not dependent on the single host computer
Disadvantages of Ring Topology

Difficult troubleshooting: It requires specialized test equipment to determine the cable faults. If any fault occurs in the cable, then it would disrupt the communication for all the nodes.
  • Failure: The breakdown in one station leads to the failure of the overall network.
  • Reconfiguration difficult: Adding new devices to the network would slow down the network.
  • Delay: Communication delay is directly proportional to the number of nodes. Adding new devices increases the communication delay.
Even though it’s popular, a ring topology is still vulnerable to failure without proper network management. Since the flow of data transmission moves unidirectionally between nodes along each ring, if one node goes down, it can take the entire network with it. That’s why it’s imperative for each of the nodes to be monitored and kept in good health. Nevertheless, even if you’re vigilant and attentive to node performance, your network can still be taken down by a transmission line failure.

The question of scalability should also be taken into consideration. In a ring topology, all the devices on the network share bandwidth, so the addition of more devices can contribute to overall communication delays. Network administrators need to be mindful of the devices added to the topology to avoid overburdening the network’s resources and capacity. Additionally, the entire network must be taken offline to reconfigure, add, or remove nodes. And while that’s not the end of the world, scheduling downtime for the network can be inconvenient and costly.

Star Network Topology

A star topology consists of devices that are all connected to a single hub through dedicated connections. As such, if there are n devices in a network, and the number of physical channels to connect them is also n.
Due to their simplicity, star network topologies are relatively easy to set up. However, because the devices are only connected to the hub and not each other, direct communication between devices is not possible. Instead, data must first be sent to the hub, which will then transmit it to the desired device. Thus, if the hub goes down, the entire network will fail to operate.

Each computer connects to a central hub (could be a switch as well) using  point-to-point connections.   A hub would broadcast the data across the entire network, where as a switch would map MAC addresses.
  • Star topology is an arrangement of the network in which every node is connected to the central hub, switch or a central computer.
  • The central computer is known as a server, and the peripheral devices attached to the server are known as clients.
  • Coaxial cable or RJ-45 cables are used to connect the computers.
  • Hubs or Switches are mainly used as connection devices in a physical star topology.
  • Star topology is the most popular topology in network implementation.
Advantages of Star Topology
  • Efficient troubleshooting: Troubleshooting is quite efficient in a star topology as compared to bus topology. In a bus topology, the manager has to inspect the kilometers of cable. In a star topology, all the stations are connected to the centralized network. Therefore, the network administrator has to go to the single station to troubleshoot the problem.
  • Network control: Complex network control features can be easily implemented in the star topology. Any changes made in the star topology are automatically accommodated.
  • Limited failure: As each station is connected to the central hub with its own cable, therefore failure in one cable will not affect the entire network.
  • Familiar technology: Star topology is a familiar technology as its tools are cost-effective.
  • Easily expandable: It is easily expandable as new stations can be added to the open ports on the hub.
  • Cost effective: Star topology networks are cost-effective as it uses inexpensive coaxial cable.
  • High data speeds: It supports a bandwidth of approx 100Mbps. Ethernet 100BaseT is one of the most popular Star topology networks.
Good traffic handling if we use a switch, which will reduce the collision domain.
Addition or deletion of nodes can be done easily, so its good for small home/office settings.

Any failure at a single node does not effect the whole network.
It is easy to diagnose a star network. Simply diagnosing the HUB will show up which node is bad.

We can use several cable type in the same network with a hub that can support multiple cable types.

Disadvantages of Star Topology
  • A Central point of failure: If the central hub or switch goes down, then all the connected nodes will not be able to communicate with each other.
  • Cable: Sometimes cable routing becomes difficult when a significant amount of routing is required.
  • Single point of failure at the central hub.
  • Using a dumb hub could be a security risk.
  • The Extended Star Topology refers to a network topology that combines an Ethernet network with several LANs extending beyond a single level.
Tree Network Topology

The tree topology structure gets its name from how the central node functions as a sort of trunk for the network, with nodes extending outward in a branch-like fashion. However, where each node in a star topology is directly connected to the central hub, a tree topology has a parent-child hierarchy to how the nodes are connected.
Those connected to the central hub are connected linearly to other nodes, so two connected nodes only share one mutual connection. Because the tree topology structure is both extremely flexible and scalable, it’s often used for wide area networks to support many spread-out devices.
  • Tree topology combines the characteristics of bus topology and star topology.
  • A tree topology is a type of structure in which all the computers are connected with each other in hierarchical fashion.
  • The top-most node in tree topology is known as a root node, and all other nodes are the descendants of the root node.
  • There is only one path exists between two nodes for the data transmission. Thus, it forms a parent-child hierarchy.
Advantages of Tree Topology

Combining elements of the star and bus topologies allows for the easy addition of nodes and network expansion. Troubleshooting errors on the network is also a straightforward process, as each of the branches can be individually assessed for performance issues.
  • Support for broadband transmission: Tree topology is mainly used to provide broadband transmission, i.e., signals are sent over long distances without being attenuated.
  • Easily expandable: We can add the new device to the existing network. Therefore, we can say that tree topology is easily expandable.
  • Easily manageable: In tree topology, the whole network is divided into segments known as star networks which can be easily managed and maintained.
  • Error detection: Error detection and error correction are very easy in a tree topology.
  • Limited failure: The breakdown in one station does not affect the entire network.
  • Point-to-point wiring: It has point-to-point wiring for individual segments.
Disadvantages of Tree Topology

As with the star topology, the entire network depends on the health of the root node in a tree topology structure. Should the central hub fail, the various node branches will become disconnected, though connectivity within, but not between branch systems will remain.

Because of the hierarchical complexity and linear structure of the network layout, adding more nodes to a tree topology can quickly make proper management an unwieldy, not to mention costly, experience. Tree topologies are expensive because of the sheer amount of cabling required to connect each device to the next within the hierarchical layout.
  • Difficult troubleshooting: If any fault occurs in the node, then it becomes difficult to troubleshoot the problem.
  • High cost: Devices required for broadband transmission are very costly.
  • Failure: A tree topology mainly relies on main bus cable and failure in main bus cable will damage the overall network.
  • Reconfiguration difficult: If new devices are added, then it becomes difficult to reconfigure.
Mesh Network Topology

Mesh technology is an arrangement of the network in which computers are interconnected with each other through various redundant connections.
  • There are multiple paths from one computer to another computer.
  • Ring Topology
  • It does not contain the switch, hub or any central computer which acts as a central point of communication.
  • The Internet is an example of the mesh topology.
  • Mesh topology is mainly used for WAN implementations where communication failures are a critical concern.
  • Mesh topology is mainly used for wireless networks.
  • Mesh topology can be formed by using the formula: Number of cables = (n*(n-1))/2;
  • Where n is the number of nodes that represents the network.
Mesh topology is divided into two categories
  1. Fully connected mesh topology.
  2. Partially connected mesh topology.
Full Mesh Topology:

In a full mesh topology, each computer is connected to all the computers available in the network.

Partial Mesh Topology:

In a partial mesh topology, not all but certain computers are connected to those computers with which they communicate frequently.

Advantages of Mesh Topology
  • Multiple paths are can be used for transmitting a message.
  • Due to the presence of direct, dedicated links, mesh topologies do not have any traffic problems.
  • Mesh topologies are reliable and stable, and the complex degree of interconnectivity between nodes makes the network resistant to failure. For instance, no single device going down can bring the network offline.
  • Fast Communication: Communication is very fast between the nodes.
  • Easier Reconfiguration: Adding new devices would not disrupt the communication between other devices.
Disadvantages of Mesh Topology

Mesh topologies are incredibly labor-intensive. Each interconnection between nodes requires a cable and configuration once deployed, so it can also be time-consuming to set up. As with other topology structures, the cost of cabling adds up fast, and to say mesh networks require a lot of cabling is an understatement.
  • Cost: A mesh topology contains a large number of connected devices such as a router and more transmission media than other topologies.
  • Management: Mesh topology networks are very large and very difficult to maintain and manage. If the network is not monitored carefully, then the communication link failure goes undetected.
  • Efficiency: In this topology, redundant connections are high that reduces the efficiency of the network.
  • Difficult maintenance costs.  You can’t defer maintenance just because you have a mesh network.
Hybrid Network Topology

A hybrid topology is a combination of two or more different types of topologies. For example, a hybrid topology may consist of a ring topology that is used in one department of a company and a mesh topology that is used in another to form one complex topology. By combining two or more topologies together, a network is able to take advantage of the benefits of multiple topologies. However, it is important to remember that the network will also inherit the disadvantage of its combined topology types as well.
Hybrid topologies combine two or more different topology structures—the tree topology is a good example, integrating the bus and star layouts. Hybrid structures are most commonly found in larger companies where individual departments have personalized network topologies adapted to suit their needs and network usage.
  • The combination of various different topologies is known as Hybrid topology.
  • A Hybrid topology is a connection between different links and nodes to transfer the data.
  • When two or more different topologies are combined together is termed as Hybrid topology and if similar topologies are connected with each other will not result in Hybrid topology. For example, if there exist a ring topology in one branch of ICICI bank and bus topology in another branch of ICICI bank, connecting these two topologies will result in Hybrid topology.
Advantages of Hybrid Topology

The main advantage of hybrid structures is the degree of flexibility they provide, as there are few limitations on the network structure itself that a hybrid setup can’t accommodate.
  • Reliable: If a fault occurs in any part of the network will not affect the functioning of the rest of the network.
  • Scalable: Size of the network can be easily expanded by adding new devices without affecting the functionality of the existing network.
  • Flexible: This topology is very flexible as it can be designed according to the requirements of the organization.
  • Effective: Hybrid topology is very effective as it can be designed in such a way that the strength of the network is maximized and weakness of the network is minimized.
Disadvantages of Hybrid Topology

However, each type of network topology comes with its own disadvantages, and as a network grows in complexity, so too does the experience and know-how required on the part of the admins to keep everything functioning optimally. There’s also the monetary cost to consider when creating a hybrid network topology.
  • Complex design: The major drawback of the Hybrid topology is the design of the Hybrid network. It is very difficult to design the architecture of the Hybrid network.
  • Costly Hub: The Hubs used in the Hybrid topology are very expensive as these hubs are different from usual Hubs used in other topologies.
  • Costly infrastructure: The infrastructure cost is very high as a hybrid network requires a lot of cabling, network devices etc.

Visit Us for more informative Articles and Video Tutorials:

What Is Networking?

What is Networking?: More Definitions - Examples & Purposes - Here we Discuss What is Networking?  with More best definitions and their Purposes of Networking or Networks as you say..

What is Networking?: More Definitions - Examples & Purposes - Here we Discuss What is Networking?  with More best definitions and their Purposes of Networking or Networks as you say..

What is Networking?

A computer network consists of two or more computers that are linked in order to share resources such as printers CD ROM or allow electronic communications. The computers on a computer network may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams.

More definitions of Networking..

In Computer science, a network is defined as the connection of at least two computer systems, either by a cable or a wireless connection.

Definition # 3 :-

The simplest network is a combination of two computers connected by a cable. This type of network is called a peer-to-peer network. There is no hierarchy in this network; both participants have equal privileges.

Each computer has access to the data of the other device and can share resources such as disk space, applications or peripheral devices like printers etc.

Examples of Networking

An example of networking is sharing and acquiring information between different divisions of the same company to share information and solve business problems. 

An example of networking is linking the entire network of computers to a print server to allow each workstation to have the ability to print documents.

Networks allow computers to share and access resources with other computing devices connected to it. Data and information: Networks allow computers to share data and information. A network allows several people to be connected to one printer or scanner, thus making optimal use of these resources.

A network is two or more computers connected together to share information and files between them. Businesses aren’t the only ones that can benefit from creating a network. Home users can enjoy sharing music, movies and printers from any computer.

Following are the examples of Networking are:

  1. File Sharing
  2. Video Games
  3. The World Wide Web
  4. The Internet
  5. Power line and Airline Network
  6. Citation Network
  7. Language Network
  8. Economic Network
  9. Metabolic and Protein Network
  10. Social Network

File Sharing:-

Computers connected to a network can share files and documents with each other. Personal computers connected to a business network can choose which files and folders are available to share on the network.

Video Games:-

Console and PC gamers benefit from networking also. You can easily set up multiplayer death matches and even host your own game server.

The World Wide Web:-

This is a directed network in which nodes represent Web pages and edges are the hyperlinks between pages. More precisely, there exists an edge from page p to page q if page p contains at least one hyperlink pointing to page q. Usually, the actual number of hyperlinks from p page q is not important and hence the network modelling the Web is unweighted.

Studying the Web as a network is of crucial importance in the field of Web information retrieval. Web search engines, for instance, heavily exploit the Web topology in order to rank Web pages that are returned to the user that issued a query. The PageRank method, which is a major ingredient of Google search engine, is a fitting example.

The Internet:-

This is a collection of routers linked by various physical lines. The Internet is a growing network with no central control authority. When adding a new node to the Internet, two factors mainly determine the router node to connect to: distance and bandwidth. While distance puts obvious constraints, bandwidth, a measure of connection speed of the router, is typically the dominant factor.

This explains the emergence of hubs in the Internet. The study of Internet topology is crucial to investigate the robustness of the network under failures, which involve nodes randomly, and attacks, which purposely decimate network hubs. If the network is highly connected and dominated by few hubs, then random failures are generally not problematic, but attacks aimed to destroy the vital hubs might have Draconian effects.

Powerline and Airline Network:-

These are human-made networks that might be involved in random failures as well as targeted attacks. Failures may have cascading effects: the failure of one node may recursively provoke the failure of connected nodes.

Clearly, such events on these networks might have catastrophic consequences. The topology of the network directly influences the magnitude and reach of such events.

Citation Networks:-

An article citation network links scholarly papers through bibliographic references contained in the bibliography of the papers. This network is directed and follows the temporal ordering of papers: we cite the past, not the future. Hence, cycles are very rare, and a citation network closely resembles a directed acyclic graph. Moreover, papers may be aggregated at different levels, forming bibliometric units like scholars and journals.

These bibliometric units can play the role of nodes is a citation network, with edges representing the citations among them. For instance, in a journal citation network, nodes are academic journals, and there is an edge from journal i to journal j if some article published in i cites some article appearing in j. Usually, such a network is weighted, with the weight of an edge representing the number of citations between the journals participating in the edge.

Citation networks are fundamental tools in bibliometrics, the discipline that concerns itself with the study of the dissemination of knowledge through academic publication. In particular, bibliometric indicators like the PageRank-inspired Eigen factor take full advantage of the topology of journal citation networks.

Citation networks arise also in different contexts like patents and corresponding citations and published opinions of judges and their citations within and across opinion circuits.

Language Network:-

In these networks the nodes are words and the links represent relationships among words like significant co-occurrence in texts.

The properties of this network suggest some unexpected features of language organization that might reflect the evolutionary and social history of lexicons and the origins of their flexibility and combinatorial nature.

The known dramatic effects of disconnecting the most connected vertices in such networks can be identified in some language disorders like agrammatism, a kind of aphasia in which speech is non-fluent, labored, halting and lacking in function words.

Economic Networks:-

Market can be viewed as a huge directed multi-relational network. Companies, firms, financial institutions, governments play the role of nodes. Links symbolize different interactions between them, for instance purchases and sales or financial loaning, and the weight of the links captures the value of the transaction.

Viewing the economy as a network of interacting actors is useful to make sense of global financial meltdowns, which are provoked by a sequence of failures cascading over the highly connected and interdependent network economy.

Metabolic and Protein Networks:-

The nodes of metabolic networks are simple molecules like water or ATP. The links are the biochemical reactions that take place between these molecules. Moreover, proteins can be viewed as nodes of a complex network in which two proteins are connected if they can physically interact.

An important example is hemoglobin, a protein complex made of four proteins that attach together to transport oxygen in bloodstreams. The robustness of such life maps under failures determines our ability to survive various diseases, and the identification of hub molecules and proteins allow researchers to design effective drugs to cure diseases.

Social Networks:-

Social networks link people according to various social relationships, like acquaintance, friendship, collaboration, and sexual relation. They are of paramount importance to understand and anticipate the spread of ideas, innovations, fads, as well as biological and computer viruses. For instance, the dominant position of hubs in sexual networks. people with an extraordinary number of sexual partners — has been adopted as an explanation of the partially unexpected diffusion and persistence of AIDS epidemic, which defies the predictions of classical epidemic models based on the homogeneous, random network hypothesis. Indeed, due to their high connectivity, hubs are easy to be infected and, once infected, they potentially can pass the virus to all linked people.

Furthermore, social networks has been extensively used to measure the social standing of people participating in the network. The interpersonal directed links in a social network are interpreted as input-output channels for the transmission of influence, and the possibly negative weight of links captures the endorsement strength between individuals.

Some of these networks are made by nature, other are built by humans. All of them are webs without a spider: there exist no central authority that regulates their growth, but they evolve in a self-organized and decentralized way.

The majority of these networks exist since many years, some of them (biological networks) are here since millions of years. So, what is the reason of the recent buzz about network science? In the last years many researchers independently showed that real networks have similar architectures, regardless of their age, function, and scope, that elude the random world. Nature doesn’t play dices, and neither human builders of networks.

Purposes of Network

A network allows sharing of files, data, and other types of information giving authorized users the ability to access information stored on other computers on the network. Distributed computing uses computing resources across a network to accomplish tasks.

File and Data Sharing:-

At one time, file-sharing consisted mostly of saving documents to floppy disks that could be physically transferred to other computers by hand. With networking, however, files can be shared instantaneously across the network, whether with one user or with hundreds.

Employees across departments can collaborate on documents, exchange background material, revise spreadsheets and make simultaneous additions and updates to a single central customer database without generating conflicting versions.

Resource Sharing:-

Computer networking also allows the sharing of network resources, such as printers, dedicated servers, backup systems, input devices and Internet connections. By sharing resources, unique equipment like scanners, color printers or high-speed copiers can be made available to all network users simultaneously without being relocated, eliminating the need for expensive redundancies.

What’s more, specific shared resources can be targeted to deliver documents or results directly to the office or department that needs them.

Data Protection and Redundancy:-

Preventing critical data loss saves businesses worldwide countless millions of dollars every year. Networking computers together allows users to distribute copies of important information across multiple locations, ensuring essential information isn’t lost with the failure of any one computer in the network.

By utilizing central backup systems both on- and off-site, unique documents and data can be gathered automatically from every computer in the network and securely backed up in case of physical computer damage or accidental deletion.

Ease of Administration:-

Information technology (IT) officers and computer network administrators love network systems because they allow the IT professional to maintain uniform versions of software, protocols and security measures across hundreds or thousands of individual computers from one IT management station.

Instead of individually upgrading each computer in a company one at a time, a network administrator can initiate an upgrade from a server and automatically duplicate the upgrade throughout the network simultaneously, allowing everyone in the company to maintain uniform software, resources and procedures.

Internal Communications:-

Computer networking also allows organizations to maintain complex internal communications systems.

Network email can be instantaneously delivered to all users, voice mail systems can be hosted via network and made available system wide and collaborative scheduling software and program management tools allow employees to coordinate meetings and work activities that maximize effectiveness, while also notifying managers and co-workers of plans and progress.

Distributing Computing Power:-

Organizations that demand extraordinary computing power benefit from computer networking by distributing computational tasks across multiple computers throughout the network, breaking complex problems into hundreds or thousands of smaller operations, which are then parceled out to individual computers.

Each computer in the network performs its operations on its own portion of the larger problem and returns its results to the controller, which gathers the results and makes conclusions no computer could accomplish on its own.

Visit Us for more informative Articles and Video Tutorials:

Sunday, December 12, 2021

What is Network topology?

 What Is Network Topology?:- Covered following Topics: Definitions of Network Topology, Importance of Network Topologies and Why Network Topology Important?

 What Is Network Topology?:- Covered following Topics: Definitions of Network Topology, Importance of Network Topologies and Why Network Topology Important?

We are Covering Following Important Topics regarding Network Topology:
  1. Definitions of Network Topology.
  2. Importance of Network Topologies.
  3. Why Network Topology Important?
Definitions of Network Topology

Network topology describes the physical and logical relationship of nodes in a network, the schematic arrangement of the links and nodes, or some hybrid combination thereof. Network topology is the schematic description of the arrangement of the physical and logical elements of a communication network.

Network topology refers to the manner in which the links and nodes of a network are arranged to relate to each other. Topologies are categorized as either physical network topology, which is the physical signal transmission medium, or logical network topology, which refers to the manner in which data travels through the network between devices, independent of physical connection of the devices. Logical network topology examples include twisted pair Ethernet, which is categorized as a logical bus topology, and token ring, which is categorized as a logical ring topology.

Physical network topology examples include star, mesh, tree, ring, point-to-point, circular, hybrid, and bus topology networks, each consisting of different configurations of nodes and links. The ideal network topology depends on each business’s size, scale, goals, and budget. A network topology diagram helps visualize the communicating devices, which are modeled as nodes, and the connections between the devices, which are modeled as links between the nodes.

Topology defines the structure of the network of how all the components are interconnected to each other. There are two types of topology: physical and logical topology.

Physical Network Topology:-

Physical topology is the geometric representation of all the nodes in a network.
The physical network topology refers to the actual connections (wires, cables, etc.) of how the network is arranged. Setup, maintenance, and provisioning tasks require insight into the physical network.

Logical Network Topology:-

The logical network topology is a higher-level idea of how the network is set up, including which nodes connect to each other and in which ways, as well as how data is transmitted through the network. Logical network topology includes any virtual and cloud resources.

Importance of Network Topologies

The layout of a network has a direct impact on network functionality. Selecting the right topology can improve performance and data efficiency, optimize allocation of resources, and reduce operational costs.

Software-created network topology diagrams are important references for diagnosing network connectivity problems, investigating network slowdowns, and generally troubleshooting issues.

One of the primary uses of network topology is to define the configuration of various telecommunication networks, including computer networks, command and control radio networks, and industrial fieldbuses.

Why Network Topology Important?

The layout of your network is important for several reasons. Above all, it plays an essential role in how and how well your network functions. Choosing the right topology for your company’s operational model can increase performance while making it easier to locate faults, troubleshoot errors, and more effectively allocate resources across the network to ensure optimal network health.

A streamlined and properly managed network topology can increase energy and data efficiency, which can in turn help to reduce operational and maintenance costs.

The way a network is arranged can make or break network functionality, connectivity, and protection from downtime. The question of, “What is network topology?” can be answered with an explanation of the two categories in the network topology.

Types of Network Topologies


Visit Us for more informative Articles and Video Tutorials:

Types of Computer Networks

Types of Computer Networks: - In this Article we will discuss In 2021 which types of Computer Networks are using. List are: 1-Personal Area Network (PAN), 2-Local Area Network (LAN), 3-Wireless Local Area Network (W-LAN), 4-Campus Area Network (CAN), 5-Metropolitan Area Network (MAN), 6-Wide Area Network (WAN), 7-Storage Area Network (SAN), 8-Virtual Private Network (VPN), 9-Passive Optical Local Area Network (POLAN), 10-Enterprise Private Network (EPN).

Types of Computer Networks: - In this Article we will discuss In 2021 which types of Computer Networks are using. List are: 1-Personal Area Network (PAN), 2-Local Area Network (LAN), 3-Wireless Local Area Network (W-LAN), 4-Campus Area Network (CAN), 5-Metropolitan Area Network (MAN), 6-Wide Area Network (WAN), 7-Storage Area Network (SAN), 8-Virtual Private Network (VPN), 9-Passive Optical Local Area Network (POLAN), 10-Enterprise Private Network (EPN).

A Computer Network is a group of two or more interconnected computer systems that use common connection protocols for sharing various resources and files. You can establish a computer network connection using either cable or wireless media. Every network involves hardware and software that connects computers and tools.

There are different types of computer network that can be used for sharing data, resources and applications. Computer networks are generally distinguished based on their size as well as their functions. Some computer networks are wired and some are wireless.

Wireless networks are such types of computer network that do not require cable. In this article, we have covered all types of computer networks including their definitions and characteristics.

TYPES OF COMPUTER NETWORK

A computer network is a group of computers linked to each other that enables the computer to communicate with another computer and share their resources, data, and applications. There are different types of Computer Networks are as follows:
  1. Personal Area Network (PAN)
  2. Local Area Network (LAN)
  3. Wireless Local Area Network (W-LAN)
  4. Campus Area Network (CAN)
  5. Metropolitan Area Network (MAN)
  6. Wide Area Network (WAN)
  7. Storage Area Network (SAN)
  8. Virtual Private Network (VPN)
  9. Passive Optical Local Area Network (POLAN)
  10. Enterprise Private Network (EPN)
1. Personal Area Network (PAN)

The smallest and most basic type of network, a PAN is made up of a wireless modem, a computer or two, phones, printers, tablets, etc., and revolves around one person in one building.

This type of network is typically found in small offices or residences, and are managed by one person or organization from a single device.

  • Personal Area Network is a network arranged within an individual person, typically within a range of 10 meters.
  • Personal Area Network is used for connecting the computer devices of personal use is known as Personal Area Network.
  • Thomas Zimmerman was the first research scientist to bring the idea of the Personal Area Network.
  • Personal Area Network covers an area of 30 feet.
  • Personal computer devices that are used to develop the personal area network are the laptop, mobile phones, media player and play stations.
There are two types of Personal Area Network:

  1. Wired Personal Area Network
  2. Wireless Personal Area Network
Wired Personal Area Network: Wired Personal Area Network is created by using the USB.

Wireless Personal Area Network: Wireless Personal Area Network is developed by simply using wireless technologies such as WiFi, Bluetooth. It is a low range network.

Examples Of Personal Area Network
  • Body Area Network: Body Area Network is a network that moves with a person. For example, a mobile network moves with a person. Suppose a person establishes a network connection and then creates a connection with another device to share the information.
  • Offline Network: An offline network can be created inside the home, so it is also known as a home network. A home network is designed to integrate the devices such as printers, computer, television but they are not connected to the internet.
  • Small Home Office: It is used to connect a variety of devices to the internet and to a corporate network using a VPN.
Advantages of Personal Area Network
  • Data can be synchronized between different devices.
  • It is secure.
  • Connect to any devices at a time.
  • It is easy to use.
  • It is used in offices, conferences, and meetings.
  • No extra space requires.
  • Affordable cost.
  • It is portable.
  • In PAN no extra space requires.
  • No need for extra cable and wire.
  • It used in the TV remote, AC remotes, etc.
  • It is reliable.
Disadvantages of Personal Area Network
  • PAN uses microwave signals in some digital devices which have and effect on the human body like rain and heart problems may occur.
  • It can be operated in less range of areas.
  • It is a slow data transfer.
  • Infrared signal travel only in a straight line.
  • It can only be used for the personal area.
  • The device with inbuilt WPAN is more expensive.
  • TV remote use infrared signals which have a problem that they travel in a straight line. So this count other disadvantages of PAN.
  • It interfaces with radio signals.
  • PAN has a limited range.
  • Devices are not compatible with each other.
2. Local Area Network (LAN)

We’re confident that you’ve heard of these types of networks before – LANs are the most frequently discussed networks, one of the most common, one of the most original and one of the simplest types of networks.

LANs connect groups of computers and low-voltage devices together across short distances (within a building or between a group of two or three buildings in close proximity to each other) to share information and resources. Enterprises typically manage and maintain LANs.
  • Local Area Network is a group of computers connected to each other in a small area such as building, office.
  • LAN is used for connecting two or more personal computers through a communication medium such as twisted pair, coaxial cable, etc.
  • It is less costly as it is built with inexpensive hardware such as hubs, network adapters, and ethernet cables.
  • The data is transferred at an extremely faster rate in Local Area Network.
  • Local Area Network provides higher security.
  • Using routers, LANs can connect to wide area networks (WANs, explained below) to rapidly and safely transfer data.
Advantages of Local Area Network
  1. Simple and relatively inexpensive:- The primary benefit of a local area network is that this is quick and easy to set up and reasonably priced when contrasted to other alternatives; consequently, if an organization intends to build a network at a minimal price and with flexibility, a local area network is the ultimate answer.
  2. Collaboration of Resources:- Expensive components such as printers and scanners cannot be linked to every desktop since it will indeed be very burdensome for the company, but thanks to local area networks, a corporation only clearly need one printer and scanner, and everybody can link to that printer and scanner and sends instruction from their machines, leading in meaningful cost savings for the corporation.
  3. The association involving client and server:- All information from connected PCs may be maintained on a single server. If a machine (Client) demands information, the client may effortlessly log in and retrieve the information from the system. Films and albums, for instance, can be maintained on the server and retrieved by any approved user (Client computer).
  4. Accessing of software programs:- On the LAN, software programs may also be shared. You can incorporate a single licensed program that can be used by any device on a network. It is pricey to buy a license for each device on a network, consequently sharing software is simple and straightforward, and cost-effective.
  5. Data protection:- It is more safe and secure to keep information on the server. And if you wish to update or eliminate any data, you may do so rapidly on a single server computer, and other devices will be able to obtain the new information. You may very well grant or deny access to particular users, guaranteeing that only approved users have accessibility to the network’s data.
  6. Fast communication:- LAN-connected systems or devices communicate directly at very high rates of speed, based on the LAN model and ethernet cabling installed. The most prevalent enabled speeds are 10 Mbps, 100 Mbps, and 1000 Mbps. Technologies of gigabit ethernet are quickly developing. Once the technology becomes more sophisticated and large-scale production has commenced, lower-cost variants will be accessible to the public.
Dis-advantages of Local Area Network
  1. The information security issue that arises:- Unapproved users can retrieve data if the server equipment is not programmed correctly and there is a technical glitch. As a consequence, the server’s privacy policy and procedures must be effectively managed.
  2. Long-distance major limitation:- Local area networks are often devised within a building or apartment complex and cannot be stretched to a bigger area.
  3. All devices may be disproportionately affected if the server fails:- If a file on the server gets heavily damaged or a hard disc crashes, all of the linked PCs will have extreme difficulty operating correctly.
  4. Installing a LAN is difficult and expensive:- It is expensive to establish a LAN since specialized software is essential to install a server. Additionally, communication hardware such as hubs, switches, routers, and cables are expensive to buy. A large office’s LAN must be administered and troubleshot by a professional operator.
  5. Data Sharing via Outside Sources:- Another drawback of LAN is that it is difficult and time-consuming to send files from outside the network since transportable media such as pen drives and CDs cannot be conveniently performed on all devices on the network.
3. Wireless Local Area Network (WLAN)

Stands for “Wireless Local Area Network” A WLAN, or wireless LAN, is a network that allows devices to connect and communicate wirelessly. Unlike a traditional wired LAN, in which devices communicate over Ethernet cables, devices on a WLAN communicate via Wi-Fi.

While a WLAN may look different than a traditional LAN, it functions the same way. New devices are typically added and configured using DHCP. They can communicate with other devices on the network the same way they would on a wired network. The primary difference is how the data is transmitted. In a LAN, data is transmitted over physical cables in a series of Ethernet packets. In a WLAN, packets are transmitted over the air.

Functioning like a LAN, WLANs make use of wireless network technology, such as Wi-Fi. Typically seen in the same types of applications as LANs, these types of networks don’t require that devices rely on physical cables to connect to the network.


Note: LANs and WLANs can be merged together using a bridge that connects the two networks. Wireless routers that include Ethernet ports can automatically combine wired and wireless devices into the same network.

Advantages of Wireless Local Area Network
  1. The most obvious advantage of a WLAN is that devices can connect wirelessly, eliminating the need for cables.
  2. This allows homes and businesses to create local networks without wiring the building with Ethernet.
  3. It also provides a way for small devices, such as smartphones and tablets, to connect to the network.
  4. WLANs are not limited by the number of physical ports on the router and therefore can support dozens or even hundreds of devices.
  5. The range of a WLAN can easily be extended by adding one or more repeaters.
  6. Finally, a WLAN can be easily upgraded by replacing routers with new versions.
  7. A much easier and cheaper solution than upgrading old Ethernet cables.
Disadvantages of Wireless Local Area Network
  1. Wireless networks are naturally less secure than wired networks.
  2. Any wireless device can attempt to connect to a WLAN, so it is important to limit access to the network if security is a concern.
  3. This is typically done using wireless authentication such as WEP or WPA, which encrypts the communication.
  4. Additionally, wireless networks are more susceptible to interference from other signals or physical barriers, such as concrete walls. Since LANs offer the highest performance and security, they are still used for many corporate and government networks.
NOTE: WLAN should not be confused with “WAN,” which is a wide area network.

4. Campus Area Network (CAN)

Larger than LANs, but smaller than metropolitan area networks (MANs, explained below), these types of networks are typically seen in universities, large K-12 school districts or small businesses

They can be spread across several buildings that are fairly close to each other so users can share resources.

A campus area network (CAN) is a computer network that spans a limited geographic area. CANs interconnect multiple local area networks (LAN) within an educational or corporate campus. Most CANs connect to the public Internet.

CANs are smaller than metropolitan area networks (MAN) and wide area networks (WAN), which stretch over large geographic areas. Typically, the organization that owns the campus also owns and operates all the networking equipment and infrastructure for the CAN. In contrast, MANs and WANs may combine infrastructure operated by several different providers.

Advantages of Campus Area Network
  1. A CAN is typically managed fully by an internal IT team, giving that team a high degree of control over the network.
  2. IT teams can apply security policies across the network far more easily than if the campus used multiple disconnected networks. For instance, IT may install and manage firewalls to protect the data within the CAN.
  3. IT can also manage access to the network by setting login requirements, blocking unsafe devices, and setting up other access control safeguards.
  4. CAN is economical in the sense that it uses fewer cables, switches, hubs and routers.
  5. In CAN, the message is sent one time and is transferred to all the linked departments easily.
  6. CAN use a wireless connection for connecting different departments and buildings across one organization.
  7. In CAN, files are transferred with high speed over the network (internet).
  8. One ISP across all departments:- In CAN, the internet is used from the same ISP (Internet Service Provider).
Dis-advantages of Campus Area Network
  1. Limitation for connecting nodes:- The connection between nodes (computers) is limited in size i.e. you cannot connect a large number of nodes together in CAN. And also CAN have a maximum length of 40 meters.
  2. Maintenance is expensive:- Troubleshooting and maintenance of CAN are expensive as compared to other networks.
5. Metropolitan Area Network (MAN)

This type of network is larger than LANs but smaller than WANs – and incorporate elements from both types of networks. 

MANs span an entire geographic area (typically a town or city, but sometimes a campus).

Ownership and maintenance is handled by either a single person or company (a local council, a large company, etc.)
  • A metropolitan area network is a network that covers a larger geographic area by interconnecting a different LAN to form a larger network.
  • Government agencies use MAN to connect to the citizens and private industries.
  • In MAN, various LANs are connected to each other through a telephone exchange line.
  • The most widely used protocols in MAN are RS-232, Frame Relay, ATM, ISDN, OC-3, ADSL, etc.
  • It has a higher range than Local Area Network(LAN).
Uses Of Metropolitan Area Network
  • MAN is used in communication between the banks in a city.
  • It can be used in an Airline Reservation.
  • It can be used in a college within a city.
  • It can also be used for communication in the military.
6. Wide Area Network (WAN)

Slightly more complex than a LAN, a WAN connects computers together across longer physical distances. This allows computers and low-voltage devices to be remotely connected to each other over one large network to communicate even when they’re miles apart.


The Internet is the most basic example of a WAN, connecting all computers together around the world. Because of a WAN’s vast reach, it is typically owned and maintained by multiple administrators or the public.
  • A Wide Area Network is a network that extends over a large geographical area such as states or countries.
  • A Wide Area Network is quite bigger network than the LAN.
  • A Wide Area Network is not limited to a single location, but it spans over a large geographical area through a telephone line, fiber optic cable or satellite links.
  • The internet is one of the biggest WAN in the world.
  • A Wide Area Network is widely used in the field of Business, government, and education.
Examples Of Wide Area Network:
  • Mobile Broadband: A 4G network is widely used across a region or country.
  • Last mile: A telecom company is used to provide the internet services to the customers in hundreds of cities by connecting their home with fiber.
  • Private network: A bank provides a private network that connects the 44 offices. This network is made by using the telephone leased line provided by the telecom company.
Advantages Of Wide Area Network:
  1. Geographical area: A Wide Area Network provides a large geographical area. Suppose if the branch of our office is in a different city then we can connect with them through WAN. The internet provides a leased line through which we can connect with another branch.
  2. Centralized data: In case of WAN network, data is centralized. Therefore, we do not need to buy the emails, files or back up servers.
  3. Get updated files: Software companies work on the live server. Therefore, the programmers get the updated files within seconds.
  4. Exchange messages: In a WAN network, messages are transmitted fast. The web application like Facebook, WhatsApp, Skype allows you to communicate with friends.
  5. Sharing of software and resources: In WAN network, we can share the software and other resources like a hard drive, RAM.
  6. Global business: We can do the business over the internet globally.
  7. High bandwidth: If we use the leased lines for our company then this gives the high bandwidth. The high bandwidth increases the data transfer rate which in turn increases the productivity of our company.
Disadvantages of Wide Area Network:
  1. Security issue: A WAN network has more security issues as compared to LAN and MAN network as all the technologies are combined together that creates the security problem.
  2. Needs Firewall & antivirus software: The data is transferred on the internet which can be changed or hacked by the hackers, so the firewall needs to be used. Some people can inject the virus in our system so antivirus is needed to protect from such a virus.
  3. High Setup cost: An installation cost of the WAN network is high as it involves the purchasing of routers, switches.
  4. Troubleshooting problems: It covers a large area so fixing the problem is difficult.
7. Storage-Area Network (SAN)

As a dedicated high-speed network that connects shared pools of storage devices to several servers, these types of networks don’t rely on a LAN or WAN. Instead, they move storage resources away from the network and place them into their own high-performance network.

SANs can be accessed in the same fashion as a drive attached to a server. Types of storage-area networks include converged, virtual and unified SANs.

A Storage Area Network is a dedicated, independent high-speed network that interconnects and delivers shared pools of storage devices to multiple servers. Each server can access shared storage as if it were a drive directly attached to the server.

A SAN is typically assembled with cabling, host bus adapters, and SAN switches attached to storage arrays and servers. Each switch and storage system on the SAN must be interconnected.

Advantages of Storage Area Network
  1. By integrating storage devices, SAN increases storage space usability and cost efficiency.
  2. SAN increases the network bandwidth and reliability of data I/O.
  3. Simplified storage administration.
  4. Disk mirroring
  5. Low cost of storage management
  6. Instant and real-time information
  7. SAN is separated from the regular network system and has an ability to expand the storage capacity.
  8. SAN reduces storage management cost since it simplifies the system fabric and devices management.
  9. Ability to boot itself and expand the storage capacity
  10. Hundreds of terabytes of data can be stored using any number of storage devices.
  11. SAN is not directly attached to any particular server or network, SAN can be shared by all.
Disadvantages of Storage Area Network
  1. If client computers need intensive data transfer then
  2. SAN is not the right choice. SAN is good for low data traffic.
  3. More expensive.
  4. It is very hard to maintain.
  5. As all client computers share the same set of storage devices so sensitive data can be leaked. It is preferable not to store confidential information on this network.
  6. Poor implementation results in a performance bottleneck.
  7. It’s difficult to keep a data backup in case of a system failure.
  8. Not affordable for small business.
  9. Require a high-level technical person.
8. Virtual Private Network (VPN)

By extending a private network across the Internet, a VPN lets its users send and receive data as if their devices were connected to the private network – even if they’re not. Through a virtual point-to-point connection, users can access a private network remotely.

A VPN (virtual private network) is a service that creates a safe, encrypted online connection. Internet users may use a VPN to give themselves more privacy and anonymity online or circumvent geographic-based blocking and censorship.

VPNs essentially extend a private network across a public network, which should allow a user to securely send and receive data across the internet.

Advantages of Virtual Private Network
  1. Bypass Geo-Restrictions:- Geo-Restrictions are a method of content control where the content providers choose what kind of users get to access their platforms. This control is done based on the geographical location of that user. It is possible for these platforms to see your geographical area because of your IP address. The way a VPN works is it hides your real IP address. So, deploying a VPN will, as a result, hide your real geographical address. Thus, letting you access various platforms without restrictions.
  2. Increased Online Privacy:- When you’re not using a VPN, any website you visit can see your real IP address. To the people who might not realize why this is a big deal; an IP address can reveal a lot about you which can be used against you. An IP address can reveal what country you’re in, your city, your ISP and even your zip code. When you surf the internet, you leave a footprint. ISPs can track this and sell that data to advertisers for them to create an accurate customer profile. They then target you with ads according to this footprint. With a VPN, your real IP address is hidden, freeing you from all this danger.
  3. Free from Online Censorship:- In some countries, the government imposes a ban against certain online services and websites. The Great Firewall of China is one example; it prohibits access to several applications and websites throughout the country. You can use a VPN that gives you a US based IP; meaning your fake IP will belong to the USA so China’s prohibition rules won’t apply to you and you can browse the web without any restrictions. This also applies to any restrictions your ISP imposes.
  4. Safer Torren ting:- When you are downloading Torrents, yes it is very convenient but it also poses some threats. The total number of people that download and upload a torrent is called a Swarm. All of these people can see your real IP address when you are on that torrent. Not only can it reveal everything about you, some ISPs and governments also prohibit downloading torrents. If they catch you doing this, they have the right to report you to the authorities. Who wants all that unnecessary trouble? A VPN will protect you from all this hassle by simply hiding your real IP address.
  5. Network Scalability:- First off, network scalability is the measure of how easily a network can add or remove devices that are on that network. A private network is basically a network that assigns its private IPs to the devices on that network. This kind of network is preferred by a lot of companies. The budget required to create a private network is huge. A VPN reduces this cost and the problem of scalability just by making use of the public network. Its use is even more significant for international connections.
Dis-Advantages of Virtual Private Network
  1. Illegal:- There are some countries that consider a private network, illegal like Uganda and Turkey. Some other countries are also working to ban the use of VPNs. So, before you decide to buy a VPN service, make sure your country isn’t one of the countries that want to ban VPN. Using it despite the ban might result in you having to pay a heavy fine.
  2. Decreased Performance:- When you use a VPN, what it does is it connects your network to a private server before letting you access a website. The problem with this is the private server might not respond right away to your request for a private network. What this means to you is that the website you are trying to access will take longer to load.
  3. Monitoring by the Service:- Yes, the whole point of getting a VPN is to avoid all the unnecessary monitoring and tracking online. But, even then some VPN services do monitor and track your data. It doesn’t mean that their intentions are malicious all the time, but it is a possibility. There is also a chance that the service will not tell you that they’ll be monitoring you. This is the case with free VPNs or the ones that cost much less than other standard VPN services. So, that is another thing to keep in mind before paying for or downloading such a service.
  4. Unable to Bypass 100%:- The biggest reason why VPNs are so popular is because it allows access to services and websites that might have been inaccessible in that geographic area. It is easier with a VPN to access those websites but even VPNs cannot allow access to certain sites. Hulu is an example of such a site. You can only access it if you live in the USA and a person from say, Nepal, cannot access it even with the use of a VPN. This is because of the agreement they have with content producers. They have to abide by it and ban it from certain areas.
  5. Increased Cost:- As mentioned before, some VPNs monitor your online activity. Some of these free services also do not work as intended, leaking your private internet information. A good Virtual Private Network requires payment which can be up to $100 every year. This is not a lot for big companies but for someone to use it at home, this might be a large amount to be spent.
9. Passive Optical Local Area Network (POLAN)

As an alternative to traditional switch-based Ethernet LANs, POLAN technology can be integrated into structured cabling to overcome concerns about supporting traditional Ethernet protocols and network applications such as PoE (Power over Ethernet).

A point-to-multipoint LAN architecture, POLAN uses optical splitters to split an optical signal from one strand of single mode optical fiber into multiple signals to serve users and devices.

10. Enterprise Private Network (EPN)

This type of network is built and owned by businesses that want to securely connect its various locations to share computer resources.

Visit Us for more informative Articles and Video Tutorials:

What is HTML?

What is HTML? :- The simplest way to learn what is HTML is with Shahzad Academy. Become a master of Hypertext Markup Language with our tutor...