Every day, computer networks grow in size and popularity. As the internet keeps stretching to other parts of the globe, the exchange of information among computers is constantly increasing. Understanding the connections that allow computer networks to flourish will give you insight into basic computer network operations, how it is connected, the things required for a successful connection and how information is transmitted.
WAN stands for wide area network, and LAN stands for local area network. These two types of networks allow two or more computers to connect. LANs are used for more localized and smaller networking, for example, in schools, homes, and businesses. On the other hand, WANs are used for covering wider geographical areas, such as towns, even giving access to computers from other countries. LANs are more fast and secure than WANs, but WANs create a larger span of connectivity. In addition, the organizations that deploy LANs control, own, and manage it in-house, while WANs might be owned by more than one organization.
LANs consist of computer networks that range in size from a couple of computers in a small space to thousands of devices occupying a couple of buildings. Their main function is to interconnect computers and give shared access to printers, network storage, and file servers. Moreover, LANs can connect more computers and/or the internet if plugged into larger LANs or WANs, respectively.
To perform LAN networking, you require switches, cables, routers, among other components, to give users the ability to connect to websites, internal servers, and other LANs belonging to the same WAN. Two primary ways used to enable LAN connections are Wi-Fi and ethernet. Wi-Fi connects computers to a LAN using radio waves, while the ethernet uses an ethernet cable to connect wired devices to the LAN. Fiber Distributed Data Interface (FIDDI), token rings, and Attached Resource Computer Networks (ARCNET) are examples of LAN technologies. Nonetheless, when the costs of connectivity decreased, and Wi-Fi and ethernet speeds increased, ARCNET and FIDDI lost favor.
The cost and flexibility of a wireless LAN can present it as a preferred option to a wired LAN. The rise in virtualization has also fueled the development of virtual LANs. This gives network administrators the ability to partition and group networks without changing the infrastructure.
Some operating systems, such as Apple OS X and Microsoft Windows, have incorporated network capabilities. If your computer is up-to-date, this means that it can be networked together with another machine. An administrator needs an ethernet cable linking a router to a server or main PC and a wireless router with a broadband connection link to create a wireless network. From there, other computing devices with integrated or attached wireless network equipment can be able to join the LAN and pick up wireless signals.
Network topologies show data transmission from one node to another as well as how LAN devices are connected. Some of the popular topologies include:
A network must be secured once it had been set up. Some of the methods used to achieve this are updating your software frequently, router security settings, and strong passwords. To enhance the level of network security, hardware security features such as security tokens, fingerprint recognition, and full disk encryption can be applied. Additional packages dealing with the maintenance and security of the network perimeter can be locally installed or bought through a SaaS (Software-as-Service) model of delivery.
LANs have a higher bandwidth, giving them faster network speed when compared to WANs. The maximum speed of a LAN can rise to ten gigabytes per second. The main purpose of WANs is to send data between different LANs, which is why they will never top the speeds of ethernet LANs.
The advantages include:
The disadvantages include:
A WAN is a geographically distributed private telecommunications network that is interconnected with several LANs. This gives office networks and small homes the ability to connect to wider networks. A WAN may be used to connect the offices to the company’s headquarters, cloud services, and branch offices in a business scenario. Users can, therefore, have access to applications, centrally-located resources, and services while eliminating the process or installing the same firewall, server app, or other resources in every computer. Most WANs use leased lines or telephone systems to connect through public networks. You can say the Internet is the largest WAN in existence because it connects computers globally.
LANs are restricted to the same geographical location; this is not the same case with WAN. LANs that have been established in any geographical location can be connected to a WAN. This means that you cannot constrain a WAN in a specific area.
Security and connectivity between WAN sites are facilitated by a virtual private network (VPN). Different types of VPNs are used in different situations. For example, the data sent across a WAN from the users is encrypted. Therefore, an SSL VPN (Secure Sockets Layer VPN) enables remote access for individuals. However, when it comes to site-to-site connections like those between branch offices, an IPsec VPN (Internet Protocol Security VPN) is a preferred choice.
There are two types of WAN connections: wireless and wired technologies. Wireless WAN consists of services like public Wi-Fi, cellular data networks, or satellite networks. Carrier Ethernet, multiprotocol label switching, commercial broadband links, and T1s are examples of wired WAN services. Wired network WANs are the most reliable data transfer mediums for most organizations. However, standards raised by the 4G LTE have caused wireless WAN technology to gain traction.
You can privately own WAN infrastructure. Third-party service providers such as the cable company, private IP network operator, and internet service provider, can also own or lease it. A public medium (i.e., the internet) or a private connection supported by a list of agreements can be used to operate WAN infrastructure. Nonetheless, a combination of both public and private network services can be achieved by using Hybrid WANs.
Bandwidth and latency constraint issues contribute to the performance issues faced by enterprise WANs. For example, latency can create bottlenecks in the network, greatly reducing the amount of data being transferred over time. WAN optimization techniques such as deduplication, protocol optimization, local caching, compression, and traffic shaping are applied to counteract these issues. In addition, to increase reliability, platforms use quality of service tools, traffic shaping, and cheap bandwidth connections to provide another layer of performance control.
In matters concerning security, that of the WAN should be extended to the user’s device. If you are a WAN user, the use of anti-malware software and a firewall is essential to protect your computer from data compromise or unauthorized access. If you choose to use a VPN, you have the added advantage of encrypting your data. Therefore, it is advised to use a VPN to establish a WAN connection, including those connected from remote sites.
Regardless of how secure a WAN might be, it would be best if you did not assume that a WAN service provider can provide you with certain levels of user safety. Moreover, the use of a VPN does not necessarily mean your device is completely secure. Hackers have time and again found ways to circumvent these obstacles and obtain whatever information they were looking for.
The advantages include:
The disadvantages include:
In conclusion, WAN stands for wide area network while LAN stands for local area network. They both allow two or more computers to connect. A LAN is for a more localized region, while a WAN serves a wider geographical area. The mesh, star, tree, ring, and bus are some of the most popular LAN topologies. The bus topology is the most simple and widely used. LANs have a higher bandwidth, hence a faster network speed when compared to WANs. WAN connections exist in two types, wireless and wired. The Internet is the largest WAN in existence.
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THE GEEK COMPUTER ENTITIES SHALL NOT BE LIABLE FOR ANY INDIRECT, INCIDENTAL, SPECIAL, CONSEQUENTIAL OR PUNITIVE DAMAGES, OR ANY LOSS OF PROFITS OR REVENUES, WHETHER INCURRED DIRECTLY OR INDIRECTLY, OR ANY LOSS OF DATA, USE, GOODWILL, OR OTHER INTANGIBLE LOSSES, RESULTING FROM (i) YOUR ACCESS TO OR USE OF OR INABILTY TO ACCESS OR USE THE SITE; (ii) ANY CONDUCT OR CONTENT OF ANY THIRD PARTY ON THE SITE, INCLUDING WITHOUT LIMITATION, ANY DEFAMATORY, OFFENSIVE OR ILLEGAL CONDUCT OF OTHER USERS OR THIRD PARTIES; (iii) ANY CONTENT OBTAINED FROM THE SITE; OR (iv) UNAUTHORIZED ACCESS, USE OR ALTERATION OF YOUR TRANSMISSIONS OR CONTENT. IN NO EVENT SHALL THE AGGRESGATE LIABILITY OF THE GEEK COMPUTER ENTITIES EXCEED THE GREATER OF ONE HUNDRED U.S. DOLLARS (U.S. $100.00) OR THE AMOUNT YOU PAID GEEK COMPUTER, IF ANY, IN THE PAST SIX MONTHS FOR THE SITE GIVING RISE TO THE CLAIM. THE LIMITATIONS OF THE SUBSECTION SHALL APPLY TO ANY THEORY OF LIABILITY, WETHER BASED ON WARRANTY, CONTRACT, STATUTE, TORT (INCLUDING NEGLIGENCE) OR OTHERWISE, AND WHETHER OR NOT THE GEEK COMPUTER ENTITIES HAVE BEEN INFORMED OF THE POSSIBILITY OF ANY SUCH DAMAGE, AND EVEN IF A REMEDY SET FORTH HEREIN IS FOUND TO HAVE FAILED OF ITS ESSENTIAL PURPOSE.