WAN (Wide Area Network): Connecting Across the Globe Description: A WAN connects networks over large geographical distances, spanning cities, countries, or continents. It’s the backbone of the internet, enabling communication and resource sharing across multiple locations.
Key Concepts of WAN Scale: WANs cover vast distances, unlike LANs, which operate within a building or campus. Technologies: WANs use leased lines, MPLS, VPNs, and the internet. Devices: Routers direct traffic, while modems and firewalls are essential for connectivity and security. Protocols: Routing protocols like OSPF and BGP are crucial for making intelligent routing decisions.
Types of WAN Connections Leased Lines: Description: A leased line is a dedicated, point-to-point connection between two locations. It is not shared with any other users, providing a reliable and stable link between the locations. Example: A private highway where only your company's traffic can travel. Cost: Leased lines are typically expensive because they are exclusive connections, but they offer high reliability and bandwidth. MPLS (Multiprotocol Label Switching): Description: MPLS is a cost-effective, flexible WAN technology that labels data packets for routing through a network. Instead of routing based on IP addresses, MPLS uses a label to quickly route traffic through predefined paths. Traffic Management: MPLS allows network administrators to prioritize certain types of traffic, ensuring critical data (e.g., voice or video calls) is given higher priority over less critical data. Benefit: Provides better traffic management and is often cheaper than leased lines. VPN (Virtual Private Network): Description: A VPN creates a secure, encrypted connection over a public network, such as the internet, to connect remote users or sites securely. Security: VPNs ensure that data sent over the internet remains private by encrypting it, even if the network is public. Use Case: Common for employees working from home to securely connect to their company's internal network. VPN Technologies: VPNs can use protocols like IPsec (Internet Protocol Security) or SSL (Secure Sockets Layer) for encryption. Internet (Public WAN): Description: The internet itself is a vast WAN that connects millions of devices globally. Businesses often use the internet to connect remote offices or access cloud services. Security Concerns: While the internet provides widespread connectivity, it does not guarantee the same level of security and reliability as private WAN technologies like leased lines or MPLS. Using firewalls and encryption is essential to safeguard sensitive information.
Configuration and Setup of WAN Choosing Technology: Factors to Consider: When selecting a WAN technology, businesses need to evaluate various factors, including: Cost: How much can the company afford to spend on network infrastructure? Bandwidth Requirements: How much data does the company need to transmit? Security Needs: How important is secure data transfer for the organization? Distance Between Locations: The geographical distance between connected offices influences the choice of technology (e.g., leased lines for short distances vs. VPNs for long distances). Obtaining Connectivity: Step: Reach out to a telecommunications provider (e.g., your Internet Service Provider or ISP) to set up the required WAN connection. Types of Providers: Telecommunications companies often offer a variety of WAN options, such as leased lines, MPLS, or internet connections. Configuring Routers: Routers' Role: Routers are devices that determine the best path for data to travel from one network to another. Configuration: Routers must be set up with proper IP addresses (a unique address assigned to each device on a network), routing protocols (such as OSPF or BGP, described below), and ACLs (Access Control Lists) for security. Command-Line Interface (CLI): The router configuration often requires a command-line interface (CLI) to input settings. Setting up Security: Firewalls: Firewalls are essential for protecting the WAN from unauthorized access. They monitor incoming and outgoing traffic to prevent attacks. Firewall Configuration: Ensure that only legitimate, authorized traffic is allowed and that malicious attempts to access the network are blocked. Testing and Monitoring: Network Testing: After configuring the WAN, it is important to test the network to ensure it is functional. Tools like ping or traceroute can check connectivity. Monitoring Tools: Use monitoring tools to keep track of the WAN’s performance. These tools help identify issues, such as delays or connectivity problems, that could affect users.
Example Scenario: WAN Company Example: Imagine a global company with offices in New York and London . To securely link the two locations, the company may choose MPLS to ensure fast, prioritized, and secure communication. Router and Firewall Configuration: Routers in both offices will be set up to route data correctly between the two locations, and firewalls will protect the data from unauthorized access.
PAN (Personal Area Network) Connecting Your Devices Description: A PAN connects devices over a very small area, typically within a person’s reach. This network is ideal for personal device connectivity, like connecting your phone to wireless headphones or smartwatch.
Key Concepts of PAN Short Range: Distance: PANs typically cover a range of a few meters (typically 1-10 meters). This makes them suitable for connecting devices in a single room or on a person’s body. Wireless Technologies: Bluetooth, NFC, Personal Wi-Fi: These are common technologies used to create PANs: Bluetooth: Connects devices over short distances (e.g., wireless headphones). NFC (Near Field Communication): Very short-range communication (a few centimeters). Used for payments or device pairing. Wi-Fi: A small, localized network, often used to connect a few personal devices to the internet or each other. Device Focus: PANs are designed for personal devices, such as smartphones, laptops, smartwatches, and other peripherals.
Common PAN Technologies Bluetooth: Purpose: Bluetooth connects devices like wireless keyboards, headphones, and printers. It has a limited range (usually up to 100 meters, depending on the Bluetooth version). Example: Connecting a smartphone to wireless headphones for music or calls. NFC (Near Field Communication): Purpose: NFC is for ultra-short-range communication (a few centimeters). It’s commonly used for mobile payments or instant device pairing. Example: Using your smartphone to make a contactless payment by bringing it close to a payment terminal. Personal Wi-Fi Networks: Purpose: These are small Wi-Fi networks, typically used to connect personal devices at home or in a small office. Example: Using your home router to connect your smartphone, laptop, and smart TV to the internet.
Configuration and Setup of PAN Bluetooth Pairing: How It Works: To pair two Bluetooth devices, put both devices in "pairing mode" and confirm the connection, either by entering a passcode or confirming the prompt on the screen. NFC Setup: How It Works: NFC requires no complex setup. Simply bring compatible devices close together (e.g., a phone and a payment terminal), and the devices automatically communicate. Wi-Fi Setup: How It Works: Setting up a Wi-Fi network for a PAN involves configuring a wireless router or access point. Devices are then connected by entering a password.
Example Scenario: PAN Bluetooth Example: You use Bluetooth to pair your wireless headphones to your smartphone to listen to music. NFC Example: You use NFC technology to make a contactless payment at a coffee shop by tapping your phone on the terminal.
Key Differences between WAN and PAN Feature WAN PAN Distance Covers large distances (cities, countries, continents) Covers short distances (a few meters) Scale Global or regional Personal or localized Technologies Leased lines, MPLS, VPNs, Internet Bluetooth, NFC, Personal Wi-Fi Devices Routers, modems, firewalls Smartphones, laptops, peripherals Purpose Connects networks, shares resources Connects personal devices
Network Topology What is Network Topology? A computer network is a collection of two or more computers which are connected together to share information and resources.
Types Of Topology Based on geographical area covered Based on Architecture Local Area Network (LAN) Metropolitan Area Network (MAN) Wide Area Network(WAN) Bus Topology Star Topology Ring Topology Tree Topology Mesh Topology Hybrid Topology
Bus Topology A Bus topology consists of a single cable—called a bus — connecting all nodes on a network without intervening connectivity devices
Advantages of Bus Topology Works well for small networks. Relatively inexpensive to implement. Easy to expand joining two cables together. Used in small network. Coaxial cable Network Card
Disadvantages of Bus Topology Management costs can be high Cables fails then whole network fails. Cables has a limited length.
Star Topology A star network is designed with each node (file server, workstation, peripheral) connected directly to a central network hub or server.
Advantages of Star Topology Good option for modern networks Low startup costs Easy to manage Offers opportunities for expansion Most popular topology in use wide variety of equipment available
Disadvantages of Star Topology Hub is a single point of failure Requires more cable than the bus Cost of installation is high. Hub
Ring topology A ring network is one where all workstations and other devices are connected in a continuous loop. There is no central server.
Advantages of Ring Topology Easier to manage; easier to locate a defective node or cable problem Well-suited for transmitting signals over long distances on a LAN Handles high-volume network traffic
Disadvantages of Ring Topology Expensive Requires more cable and network equipment at the start Not used as widely as bus topology Fewer equipment options Fewer options for expansion to high-speed communication
Tree topology It has a root node and all other nodes are connected to it forming a hierarchy. It is also called Hierarchical Topology.
Advantages Of Tree Topology Extension of Bus and Star Topology. Expansion of nodes is possible and easy. Easily managed and maintained.
Disadvantages Of Tree Topology Heavily cabled. Costly. If more nodes are added maintenance is difficult. Central hub fails, network fails.
Mesh Topology It is a point-to-point connection to other nodes or devices. Traffic is carried only between two devices or nodes to which it is connected. Mesh has n(n-2)/2 physical channels to link hn devices.
Advantages Of Mesh Topology Each connection can carry its own data load. Fault is diagnosed easily. Provide security and privacy.
Disadvantage of mesh topology Installation and configuration is difficult. Cabling cost is more. Bulk wiring is required.
Hybrid Topology It is the mixture of two or more topologies. Therefore it is called Hybrid topology. A hybrid topology combines characteristics of linear bus and star and/or ring topologies. Star-Wired Bus
Advantages of hybrid topology Reliable as error detecting and trouble shooting is easy. Effective. Scalable as size can be increased easily. Flexible. Star-Wired Ring
Disadvantages Of Hybrid Topology Complex in design. Costly.