Home | ARTS | Types of Networks

MBA (General) - IV Semester, Information Technology and E-Business, Unit 2.2

Types of Networks

   Posted On :  07.11.2021 06:26 am

Below is a list of the most common types of computer networks in order of scale.

Types of Networks

Below is a list of the most common types of computer networks in order of scale.

Personal Area Network

A personal area network (PAN) is a computer network used for communication among computer devices close to one person. Some examples of devices that are used in a PAN are printers, fax machines, telephones, PDAs and scanners. The reach of a PAN is typically about 20-30 feet (approximately 6-9 meters), but this is expected to increase with technology improvements.

Local Area Network

A local area network (LAN) is a computer network covering a small physical area, like a home, office, or small group of buildings, such as a school, or an airport. Current wired LANs are most likely to be based on Ethernet technology, although new standards like ITU-T also provide a way to create a wired LAN using existing home wires (coaxial cables, phone lines and power lines)

Campus Area Network

A campus area network (CAN) is a computer network made up of an interconnection of local area networks (LANs) within a limited geographical area. It can be considered one form of a metropolitan area network, specific to an academic setting.

In the case of a university campus-based campus area network, the network is likely to link a variety of campus buildings including; academic departments, the university library and student residence halls. A campus area network is larger than a local area network but smaller than a wide area network (WAN) (in some cases).

The main aim of a campus area network is to facilitate students accessing internet and university resources. This is a network that connects two or more LANs but that is limited to a specific and contiguous geographical area such as a college campus, industrial complex, office building, or a military base.

A CAN may be considered a type of MAN (metropolitan area network), but is generally limited to a smaller area than a typical MAN. This term is most often used to discuss the implementation of networks for a contiguous area. This should not be confused with a Controller Area Network. A LAN connects network devices over a relatively short distance. A networked office building, school, or home usually contains a single LAN, though sometimes one building will contain a few small LANs (perhaps one per room), and occasionally a LAN will span a group of nearby buildings. In TCP/IP networking, a LAN is often but not always implemented as a single IP subnet.

Metropolitan Area Network

A metropolitan area network (MAN) is a network that connects two or more local area networks or campus area networks together but does not extend beyond the boundaries of the immediate town/city. Routers, switches and hubs are connected to create a metropolitan area network.

Wide Area Network

A wide area network (WAN) is a computer network that covers a broad area (i.e. any network whose communications links cross metropolitan, regional, or national boundaries). Less formally, a WAN is a network that uses routers and public communications links.

Contrast with personal area networks (PANs), local area networks (LANs), campus area networks (CANs), or metropolitan area networks (MANs), which are usually limited to a room, building, campus or specific metropolitan area (e.g., a city) respectively. The largest and most well-known example of a WAN is the Internet.

A WAN is a data communications network that covers a relatively broad geographic area (i.e. one city to another and one country to another country) and that often uses transmission facilities provided by common carriers, such as telephone companies. WAN technologies generally function at the lower three layers of the OSI reference model the physical layer, the data link layer, and the network layer.

Global Area Network

A global area networks (GAN) specification is in development by several groups, and there is no common definition. In general, however, a GAN is a model for supporting mobile communications across an arbitrary number of wireless LANs, satellite coverage areas, etc. The key challenge in mobile communications is “handing off” the user communications from one local coverage area to the next. In IEEE Project 802, this involves a succession of terrestrial WIRELESS local area networks (WLAN).

Virtual Private Network

A virtual private network (VPN) is a computer network in which some of the links between nodes are carried by open connections or virtual circuits in some larger network (e.g., the Internet) instead of by physical wires. The link-layer protocols of the virtual network are said to be tunneled through the larger network when this is the case.

One common application is secure communications through the public Internet, but a VPN need not have explicit security features, such as authentication or content encryption. VPNs, for example, can be used to separate the traffic of different user communities over an underlying network with strong security features.

A VPN may have best-effort performance, or may have a defined service level agreement (SLA) between the VPN customer and the VPN service provider. Generally, a VPN has a topology more complex than point-to-point.

A VPN allows computer users to appear to be editing from an IP address location other than the one which connects the actual computer to the Internet.

Internetwork

Internetworking involves connecting two or more distinct computer networks or network segments via a common routing technology. The result is called an internetwork (often shortened to internet). Any interconnection among or between public, private, commercial, industrial, or governmental networks may also be defined as an internetwork.

In modern practice, the interconnected networks use the Internet Protocol. There are at least three variants of internetwork, depending on who administers and who participates in them

Intranet

Extranet

Internet

Intranets and extranets may or may not have connections to the Internet. If connected to the Internet, the intranet or extranet is normally protected from being accessed from the Internet without proper authorization. The Internet is not considered to be a part of the intranet or extranet, although it may serve as a portal for access to portions of an extranet.

Intranet

An intranet is a set of networks, using the Internet Protocol and IP-based tools such as web browsers and file transfer applications, which are under the control of a single administrative entity. That administrative entity closes the intranet to all but specific, authorized users. Most commonly, an intranet is the internal network of an organization. A large intranet will typically have at least one web server to provide users with organizational information.

Extranet

An extranet is a network or internetwork that is limited in scope to a single organization or entity but which also has limited connections to the networks of one or more other usually, but not necessarily, trusted organizations or entities (e.g., a company’s customers may be given access to some part of its intranet creating in this way an extranet, while at the same time the customers may not be considered ‘trusted’ from a security standpoint).

Technically, an extranet may also be categorized as a CAN, MAN, WAN, or other type of network, although, by definition, an extranet cannot consist of a single LAN; it must have at least one connection with an external network.

Internet

The Internet is a specific internetwork. It consists of a worldwide interconnection of governmental, academic, public, and private networks based upon the networking technologies of the Internet Protocol Suite. It is the successor of the Advanced Research Projects Agency Network (ARPANET) developed by DARPA of the U.S. Department of

Defense. The Internet is also the communications backbone underlying the World Wide Web (WWW). The ‘Internet’ is most commonly spelled with a capital ‘I’ as a proper noun, for historical reasons and to distinguish it from other generic internetworks.

Participants in the Internet use a diverse array of methods of several hundred documented, and often standardized, protocols compatible with the Internet Protocol Suite and an addressing system (IP Addresses) administered by the Internet Assigned Numbers Authority and address registries. Service providers and large enterprises exchange information about the reachability of their address spaces through the Border Gateway Protocol (BGP), forming a redundant worldwide mesh of transmission paths.

Basic Hardware Components

All networks are made up of basic hardware building blocks to interconnect network nodes, such as Network Interface Cards (NICs), Bridges, Hubs, Switches, and Routers. In addition, some method of connecting these building blocks is required, usually in the form of galvanic cable (most commonly Category 5 cable). Less common are microwave links (as in IEEE 802.12) or optical cable (“optical fiber”).

Network Interface Cards

A network card, network adapter or NIC (network interface card) is a piece of computer hardware designed to allow computers to communicate over a computer network. It provides physical access to a networking medium and often provides a low-level addressing system through the use of MAC addresses.

Repeaters

A repeater is an electronic device that receives a signal and retransmits it at a higher power level, or to the other side of an obstruction, so that the signal can cover longer distances without degradation. In most twisted pair Ethernet configurations, repeaters are required for cable which runs longer than 100 meters.

Hubs

A hub contains multiple ports. When a packet arrives at one port, it is copied unmodified to all ports of the hub for transmission. The destination address in the frame is not changed to a broadcast address.

Bridges

A network bridge connects multiple network segments at the data link layer (layer ppp of the OSI model. Bridges do not promiscuously copy traffic to all ports, as hubs do, but learn which MAC addresses are reachable through specific ports. Once the bridge associates a port and an address, it will send traffic for that address only to that port. Bridges do send broadcasts to all ports except the one on which the broadcast was received.

Bridges learn the association of ports and addresses by examining the source address of frames that it sees on various ports. Once a frame arrives through a port, its source address is stored and the bridge assumes that MAC address is associated with that port. The first time that a previously unknown destination address is seen, the bridge will forward the frame to all ports other than the one on which the frame arrived.

Bridges come in three basic types

Local bridges Directly connect local area networks (LANs)

Remote bridges Can be used to create a wide area network (WAN) link between LANs. Remote bridges, where the connecting link is slower than the end networks, largely have been replaced by routers.

Wireless bridges Can be used to join LANs or connect remote stations to LANs.

Switches

A switch is a device that forwards and filters OSI layer 2 data grams (chunk of data communication) between ports (connected cables) based on the MAC addresses in the packets. This is distinct from a hub in that it only forwards the packets to the ports involved in the communications rather than all ports connected. Strictly speaking, a switch is not capable of routing traffic based on IP address (OSI Layer 3) which is necessary for communicating between network segments or within a large or complex LAN.

Some switches are capable of routing based on IP addresses but are still called switches as a marketing term. A switch normally has numerous ports, with the intention being that most or all of the network is connected directly to the switch, or another switch that is in turn connected to a switch.

Switch is a marketing term that encompasses routers and bridges, as well as devices that may distribute traffic on load or by application content (e.g., a Web URL identifier). Switches may operate at one or more OSI model layers, including physical, data link, network, or transport (i.e., end-to-end). A device that operates simultaneously at more than one of these layers is called a multilayer switch.

Overemphasizing the ill-defined term “switch” often leads to confusion when first trying to understand networking. Many experienced network designers and operators recommend starting with the logic of devices dealing with only one protocol level, not all of which are covered by OSI. Multilayer device selection is an advanced topic that may lead to selecting particular implementations, but multilayer switching is simply not a real-world design concept.

Voice over Internet Protocol (VoIP) is a general term for a family of transmission technologies for delivery of voice communications over networks such as the Internet or other packet-switched networks. Other terms frequently encountered and synonymous with VoIP are IP telephony, Internet telephony, voice over broadband (VoBB), broadband telephony, and broadband phone.

Internet telephony refers to communications services - voice, facsimile, and/ or voice-messaging applications - that are transported via the Internet, rather than the public switched telephone network (PSTN).

The basic steps involved in originating an Internet telephone call are conversion of the analog voice signal to digital format and compression/translation of the signal into Internet protocol (IP) packets for transmission over the Internet; the process is reversed at the receiving end.

VoIP systems employ session control protocols to control the set-up and tear-down of calls as well as audio codecs which encode speech allowing transmission over an IP network as digital audio via an audio stream. Codec use is varied between different implementations of VoIP (and often a range of codecs are used); some implementations rely on narrowband and compressed speech, while others support fidelity stereo codecs.

Trends in Telecommunications

Over the past few years the landscape of the information and telecommunication industry has been subject to dramatic changes. The enormous growth of the Internet and the advances in both wired and wireless network technologies have boosted the emergence of advanced multimedia applications offered over distributed systems consisting of a heterogeneity of network technologies and information servers.

On the business side, the market share of e-business is increasing, the telco market is becoming more competitive and the unbundling of the telecommunications world has become reality. In this context, network and service providers experience that it is becoming crucial to be able to offer customers high and predictable end-to-end Quality of Service (QoS) in a cost- effective manner. These developments raise a number of new challenges for performance analysts.

Business Relies Increasingly on the Performance of ICT

Many companies in competitive markets are trying to become more cost- efficient by automating their business processes. One of the most prominent examples is the automation of sales by e-commerce applications. The doubling period is simply the time it takes to consume twice the server capacity that exists now. For some e-commerce sites, this period can be as short as six months, which is four times faster than Moore’s Law. Under these circumstances poor (network or IT) capacity planning will lead to major performance problems. And in the e-commerce context, customer dissatisfaction about overly long response times or unavailable servers will directly cause a decrease in revenues for e- commerce applications.

Other examples that illustrate that performance of information and communication infrastructures are becoming more business critical, are the use of Enterprise Resource Planning (ERP), supply chain management and billing tools. Those applications are used for increasing control over vital business processes and over the past decade their use has become increasingly popular, especially for larger companies.

Typically, these larger companies consist of several branch-stores that are geographically spread. And for this reason the enterprise applications are often implemented as distributed applications, which are connected by Virtual Private Network (VPN) communication technology. In practise, we see that unavailability of distributed enterprise applications for a few hours has negative consequences for customer care services, such as order intake and helpdesk facilities. Unavailability for a period of days makes management teams nervous, because they get the feeling of losing control over their business.

Unbundling

Unbundling of the telecom world is reality, separating functional roles in the telecom and information domain, such as access network providers, core network providers, service providers, portal providers and content providers.

This leads to a heterogeneous, multi-domain infrastructure over which new services and applications are supported, and consequently, an increasing business importance of Service Level Agreements (SLAs) between administrative domains.

A concrete example of unbundling can be found in the emerging market of mobile internet access services, such as i-mode and Vodafone-live. Fig shows a typical architecture for a mobile internet access service.

In the i-mode case illustrated in Fig the mobile access network and the service platform are both in the mobile operator domain. The gateway mainly supports authentication functionality and the service platform supports functionality such as, the start page for the service (i-menu), subscription to content provider sites and e-mail distribution (i-mail). Content such as local weather forecasts, traffic information, etc., is delivered by several contentproviders. For some cases the inter-connectivity between the mobile operator and the content provider is realised by yet another network provider.


The business success of previous mobile data services, such as WAP, was disappointing. In general, the reasons for this lack of success are due to (amongst others) the limited type and range of the offered content, the text- based presentation of information and the long browsing response times. For the commercial success of mobile internet services the gap between mobile internet access and wired internet access will have to be filled, for each of the mentioned criteria. With the breakthrough of the next generation mobile internet access services most of the obstacles for success are eliminated. For example, the latest terminals feature glossy displays and sounds, and much attention is paid to make sure that a wide range of content is provided to the users. The requirement of good browsing performance remains quite a challenge, in particular because end-to-end performance is no longer an issue of one single provider.

Increasing Heterogeneity of Services

Demand for device- and location-independent access to information and services that are presented according to user specified preferences, is still growing. In conjunction with this growing demand and boosted by the opportunities enabled by the Internet, the variety of offered services and user-devices has grown tremendously. Typically, in order to stay in business service providers have to offer a wide range of these services, such as e-mail, information downloading, on-line banking, ticketing, remote access to a company intranet and streaming services.

For these applications, the end users typically have access to information servers via a heterogeneous mix of wired and wireless access networks and backbone infrastructures. We observe that new user demands emerge with the technological advances in distributed system architectures. Each of these services has its own traffic characteristics and performance requirements, depending for example on the type of content and the level of user interaction.

Emergence of Distributed Applications and Middleware Architectures

Besides the increasing heterogeneity of user demands and offered services, network providers see new business opportunities in terms of so-called third party service provisioning (3PSP). 3PSP is the concept where network providers provide ‘open interfaces’ for ‘third party’ service providers to build services on top of communication networks. Note, that the 3PSP concept is partly a result of the unbundling trend and its growing popularity emphasises the increasing ICT dependency of modern industry.

To support applications with that cover a wide range of features, functionalities and open interfaces in multi-domain environments, software infrastructures have become increasingly complex. This has led to the development of so-called middleware architectures. Middleware technology enables to manage this heterogeneity by abstracting details of lower-layer communication protocols for application programmers.

Middleware is software that resides between the application and operating system, as illustrated in Figure. The most popular middleware architectures are the Common Object Request Broker Architecture (CORBA), a product of the Object Management Group (OMG), Microsoft’s proprietary middleware called Distributed Component Object Model (DCOM), and Sun’s increasingly popular Enterprise Java Beans (EJB). For implementation of open network interfaces much work is being done on the Open Service Architecture (OSA, recently called Open Service Access), Parlay and Simple Object Access Protocol (SOAP).


In an environment where services are created on top of middleware, much of the service control functionality is performed by the middleware layer. As a consequence, the middleware performance will have strong impact on service performance, making it important to control middleware performance.

Paradigm Shift in Performance Bottlenecks

In the context of the increasing complexity of software architectures, we observe

Pp growing impact of server and software performance on the end-to-end performance observed by the end user. During a study of i-mode page download times, we encountered an interesting effect. It appeared that the average response time was dominated by the throughput of radio links. However, the variability of response times was dominated by the service platform and content providers.

Since the 95%- percentiles of response times, which was regarded as key performance indicator, depend both on the average and the variability of response times the performance model had to include both network and server performance. In general, we experience that the assumption network performance dominates end-to-end performance will not hold.

When reviewing approaches to performance analyse, we observe a typical difference. Opposite to the communication community the emphasis in the information technology community is much more on performance monitoring and testing than on performance modelling.

This difference in approach to performance analysis seems to be an obstacle for joining communication and IT expertise in performance analysis.

This addresses a fundamental paradigm shift that has received relatively little attention in the performance modelling community, which traditionally has focused on performance aspects of communication networks, rather than servers and software architectures. Realistic modelling of end-to-end performance requires combined knowledge of performance modelling of communication and information technology.

New challenges for performance analysts

Increased importance of performance monitoring capabilities

New concepts for modelling ICT performance

Analysis techniques for performance models of servers and software architectures

Development and analysis of end-to-end multi-domain performance models

Implementing integrated performance and capacity management

Business Value of Telecommunications Network

The International Telecommunication Union (ITU) estimates the number of mobile subscribers worldwide at 4.01 billion at the end of 2008, up from 1.41 billion in 2003. This is a compound annual growth rate of 23.2%, and represents 59.3% of world population.

Global wireless subscribers will grow to over 5.5 billion by 2011 to 2012, as low-cost providers are making service prices low enough to be affordable for vast numbers of people in Third World nations. Inexpensive cell phones are now indispensable to consumers from Haiti to Africa to New Guinea. Telecommunications remains one of the largest providers of employment in the world, with over 1 million employees in the U.S. alone.

Several major factors are creating changes in the telecommunications sector today, including

Budgetary pressures and slower growth due to the global recession,

A shift in residential and personal use from wired services to wireless,

Intense competition between cable and wired services providers and

Rapid advances in Internet and wireless technologies, including more advanced cellular handsets and wider availability of 3G services.

No other industry touches as many technology-related business sectors as telecommunications, which, by definition, encompasses not only the traditional areas of local and long-distance telephone service, but also advanced technology-based services including wireless communications, the Internet, fiber-optics and satellites.

Telecom is also deeply intertwined with entertainment of all types, including cable TV systems, since cable companies are now aggressively offering local exchange service and high-speed Internet access. The relationship between the telecom and cable sectors has become even more complex as telcos are now selling TV via IP (Internet protocol) services, competing directly against cable for consumers’ entertainment dollars.

Ingenuity, innovation, cost control and a reasonable approach to spending and investment will help to move the industry ahead. New cellular, cable telephony, VOIP (Voice Over Internet Protocol) and wireless technologies promise continuous rapid evolution of this sector and pose a massive threat to traditional landlines. The cost of a cell phone call has become a bargain worldwide, and cell phone manufacturers are adding advanced new features to their phones on a regular basis.

Improved cell phone service has prompted tens of millions of consumers to cancel their landlines altogether, eating into traditional revenue streams at AT&T, Verizon and Qwest, among others. Meanwhile, wireless access to the Internet threatens traditional broadband suppliers. WiMAX, an advanced wireless technology with a range of up to 30 miles, has the potential to disrupt traditional broadband, cell phone, landline and Wi-Fi systems.

As more consumers recognize the promise, and good value, of phone service using VOIP, the number of companies offering this service has increased dramatically and millions of households and businesses worldwide have signed up for less-expensive VOIP service as an alternative to landlines, often through their cable providers as part of a bundle of services. Several heavy hitters, such as Comcast, have jumped on the VOIP bandwagon, along with startups like Skype and Vonage.

At the same time, local phone companies, led by Verizon and AT&T, are laying fiber-optic cable directly to the neighborhood and even into the home and office in order to retain customers with promises of ultra-high-speed Internet connections and enhanced entertainment offerings online.

This is the big telcos’ way of fighting back. If cell phone owners are dropping their landlines, while VOIP over cable takes even more landline customers away, then the best weapon that traditional telcos can use in their battle for market share is the Internet.

AT&T and its peers are focusing on bundled service packages (combining wireless accounts, very high-speed Internet access and entertainment such as video on demand and TV via IP, in addition to VOIP or landlines).

Next, the traditional telcos need to create innovative new value-added services that are accessed online. For example, consumers might respond well to online services that monitor home security or adjust home energy usage, or services that monitor the movements and needs of elderly family members at home. The right value-added services, controlled via cellphones and/or the Internet, could get consumers hooked, with the potential to build new revenues and stop customer turnover.

In the U.S., cellular phone companies have upgraded many of their networks to 3G. In addition, they are adding new towers in large numbers to better handle traffic volume. In developing nations, wireless service providers such as India’s Bharti Airtel have become extremely innovative and cost-effective, providing basic cellular service for very modest amounts of money.

Mergers, acquisitions and other industry changes redefined telecom. AT&T and SBC merged (changing the name of the merged company to AT&T, Inc.), and MCI merged into Verizon. Sprint and Nextel have combined to create wireless giant Sprint Nextel. The competitive landscape is shifting dramatically due to these mergers.

In addition, government regulations are evolving quickly, which will bring even bigger changes to business strategies. Overall, the telecommunications industry is in a state of continuous technological and economic flux driven by intense competition and new technologies.

Tags : MBA (General) - IV Semester, Information Technology and E-Business, Unit 2.2
Last 30 days 80 views

OTHER SUGEST TOPIC