Types of Computer Networks





Rlegardless of the objective of your system, it will require a connection protocol to connect all components. This connection can be established by Ethernet (Local Area Network), WLAN (Wi-Fi), or WAN (Wide Area Network) (Wide Area Network). When determining which connection type to utilise, weigh the dangers and advantages of each. Let us compare and contrast.

Ethernet (Ethernet) (Wired LAN)

• Ethernet connections provide a centralised connected link between local devices.

• Upgrading the Ethernet speed category once installed is difficult and expensive.

• Due to the wired necessity, distance is limited.

WLAN (Wi-Fi)

• Connection to a shared Ethernet wired relay over a local wireless network.

• Within the network area, devices can be mobile.

• Devices may be effortlessly added or withdrawn from the network.

• Unsafe; vulnerable to eavesdropping and cyber-attacks.

• Similar to a local area network, but on a larger scale; links several local networks.

• Pre-configured routers allow devices in one LAN network to communicate with those in other linked LAN networks.

• Extremely scalable.

• Increased delay as the system scales.

• Difficult to secure, making it more vulnerable to outside system influences.

Cloud Computing

Cloud networking is a modern computer network type that allows developers to link multiple devices across a large geographical region utilising cloud-based wireless networking systems managed by third-party service providers. Because of its low cost and adaptability, this kind is increasingly gaining appeal among tech companies.

• Adaptable to any sort of company or scale

• Cloud servers provide faster speeds than traditional network kinds.

Protocols for Networking

Another option to make while building a system is whether to use TCP/IP (Transmission Control Protocol) or UDP (Uniform Datagram Protocol) (User Datagram Protocol). 

TCP/IP is the most widely utilised because of its data transmission dependability and built-in loss-recovery features. Both protocols, however, have uses that should be addressed while building a system.

Switches and Hubs

Hubs and switches are both devices that link devices in a network. Both typically need a wired connection, but wireless communication is becoming more common. The way they disseminate data over the network once it is received from a device is where they vary.

• A Hub is speedy but indiscriminate; when it gets a data packet, it copies it and sends it to all connected devices instantly

 • When a switch gets a data packet, it decides which device(s) in its system the data is meant for and then delivers the data to those devices. When all devices benefit from getting all data, hubs are the ideal choice.Devices on the network or when the data is important and should not be sent randomly. 

Routers 

Rauters are the roadways that link LANs and hubs/switches, which we may think of as towns and town halls, respectively.These devices sift and forward data packets to the proper destination between two or more distinct networks at gateways, the intersection point between two or more networks. This information is crucial since most systems will require the seamless interworking of several independent networks rather than a single huge network. The benefit of splitting systems in this way is twofold: it reduces device load on specific networks while simultaneously keeping all data accessible to the devices that need it most. It's critical to define:

How your system would be split into sub-networks 

What connectivity these networks would require with each other and external systems while developing a network or later in a systems design interview. 

 Firewalls 

 Firewalls are one of the most important tools for network security since they operate as a checkpoint for data passing into or out of private networks. Firewall applications can perform a variety of security purposes. To offer varying security measures, most utilise two or more functions.

 Web Application Firewall

 The most typical function, these applications are set up to thwart common sorts of threats such Distributed Denial of Service (DDoS). These applications are simple and inexpensive, but they are vulnerable to new types of attacks.

 Packet Filtering

 This function examines each data packet that travels through it and accepts or rejects them according to user-defined rules. These are effective, but configuring them to stop all threats might be complex.

Circuit-level Gateway Implementation:

 When a new TCP/IP or UDP connection connects to the system, this function starts security sweeps. Data can travel freely without further checks after the check is done and the source is judged safe.

 Proxy Server

 This function hides connected devices' network addresses by routing all requests through a different cover device. The proxy device operates as a buffer, returning only defined types of data to the source, adding an extra layer of anonymity and screening. 


Comments

Popular posts from this blog

What Is External Storage and How Does It Work?

So, what exactly is cloud networking?

What is a NAS (Network Attached Storage)?