wp header logo 123

7 types of networks and their use cases – TechTarget

Local News MP News

Getty Images/iStockphoto
A computer network is an interconnected system of devices, represented as network nodes, that share information, data and resources among each other.
Depending on the network type, devices can be as simple as computers or smartphones that connect into a network. Larger networks use devices like routers and switches to create the underlying network infrastructure.
Not all networks are the same. There are several types of networks, each existing to support the devices, size and location of the system. Networks also have differing levels of access and forms of connectivity.
Below are seven common types of networks, along with their benefits and use cases.
A personal area network (PAN) is the smallest and simplest type of network. PANs connect devices within the range of an individual and are no larger than about 10 meters (m). Because PANs operate in such limited areas of space, most are wireless and provide short-range connectivity with infrared technology.
An example of a wireless PAN is when users connect Bluetooth devices, like wireless headsets, to a smartphone or laptop. Although most PANs are wireless, wired PAN options exist, including USB.
PANs are configured so individual users can connect their devices within their personal vicinity. A literal example of this is a body area network, in which a user physically wears connected devices. Small home networks with computers, printers and other wireless devices are also considered PANs.
Looking ahead, PANs could function as a key player in the world of futurology. Some networking experts have predicted that PANs may be able to optimize and enable IoT systems in both offices and homes.
A local area network (LAN) is a system where computers and other devices connect to each other in one location. While PANs connect devices around an individual, the scope of a LAN can range from a few meters in a home to hundreds of meters in a large company office. The network topology determines how devices in LANs interconnect.
LANs use both wired and wireless connectivity options. Wireless LAN (WLAN) has surpassed traditional wired LAN in terms of popularity, but wired LAN remains the more secure and reliable option. Wired LANs use physical cables, like Ethernet, and switches; WLANs use devices, like wireless routers and access points, to interconnect network devices through radio frequency waves.
Network administrators can implement security protocols and encryption standards to secure wireless networks. Wired LANs are usually more secure because they require a physical cable to form a connection and are far less susceptible to compromise.
LANs support home offices and corporate network environments, among others. Users in personal home offices can connect their devices and transfer data between each device with little error. Employees in company offices can quickly communicate, share and access the same data and services provided by their organization.
The most common WLAN use case is Wi-Fi. A wireless network can use Wi-Fi radio signals to connect multiple devices in a single location. It’s important to note, though, that WLAN and Wi-Fi differ. A Wi-Fi network is a WLAN, but not all WLANs use Wi-Fi.
A virtual LAN (VLAN) is a type of LAN configuration that virtually groups network components into segments. Network administrators create VLANs to operate segments as individual systems, separate from the rest of the LAN. VLANs prevent network congestion by isolating LAN traffic for each segment, in turn improving network performance and efficiency, simplifying network management and increasing security.
A metropolitan area network (MAN) is an interconnection of several LANs throughout a city, town or municipality. Like LANs, a MAN can use various wired or wireless connectivity options, including fiber optics, Ethernet cables, Wi-Fi or cellular.
The main purpose of a MAN is to have the same network available in several locations. In a LAN, the network is accessible in one location. In a MAN, organizations with LANs in the same municipality — such as different office buildings — can extend their network connectivity to those different locations.
Government entities may also configure a MAN to provide public network connectivity to users. An example of this is when municipalities offer free, public Wi-Fi to city residents using wireless MAN technology.
A campus network, sometimes referred to as a campus area network or CAN, is a network of interconnected, dispersed LANs. Like MANs, campus networks extend coverage to buildings close in proximity. The difference between the two configurations is that campus networks connect LANs within a limited geographical area, while MANs connect LANs within a larger metro area. The geographical range of a campus network varies from 1 kilometer to 5 km, while MANs can extend to 50 km.
Network administrators commonly set up campus networks to create networks large enough to cover a school or university. The term campus network might imply that these networks work only for university environments, but businesses also set up campus networks to distribute one standardized network across buildings in a localized area.
A wide area network (WAN) is the most expansive type of computer network configuration. Like a MAN, a WAN is a connection of multiple LANs belonging to the same network. Unlike MANs, however, WANs aren’t restricted to the confines of city limits. A WAN can extend to any area of the globe. For example, an organization with a corporate office in New York can connect a branch location in London in the same WAN. Users in both locations obtain access to the same data, files and applications, and can communicate with each other.
The main draw of a WAN is its facilitation of long-distance network connectivity. Organizations use WANs to connect branch offices located away from headquarters. But businesses aren’t the only ones that can use WANs; an estimated two-thirds of the global population uses the internet — the world’s most popular and largest WAN — today.
A content delivery network (CDN) is a network of globally distributed servers that deliver dynamic multimedia content — such as interactive ads or video content — to web-based internet users. CDNs use specialized servers that deliver bandwidth-heavy rich media content by caching it and speeding up delivery time. CDN providers deploy these digitized servers globally at a network edge, creating geographically distributed points of presence.
When a user requests data in a network, a proxy server forwards the data to the nearest CDN server, which encrypts it into a smaller, more manageable file for the network to handle, before delivering it to the origin server. An origin server provides the content to the user.
CDNs are fairly simple to configure, and organizations have many CDN vendor options from which to purchase services.
CDNs enable the delivery of rich — i.e., dynamic — media. Most websites and applications incorporate some form of dynamic content, from embedded social media posts to video-streaming players. CDNs are more important than ever for accommodating the vast amount of complex data shared among millions of internet users each day.
A virtual private network (VPN) creates a private network overlay across an existing public network. VPNs use tunneling protocols that create encrypted connections between the network and client devices. Network traffic travels over the VPN service’s secure, encrypted tunnels instead of a public network, effectively hiding a user’s IP address and data from ISPs and cybersecurity hackers. The user’s location appears to be wherever the VPN server exists.
Studies show that VPNs have risen in popularity in recent years as internet users seek to browse the web without surveillance from their ISPs. An ISP can monitor a user’s web activity, including sites visited and the types of content downloaded. VPNs hide this information from an ISP, while still providing the user with access to the network service.
VPNs also facilitate remote work for individuals working outside of office locations. User devices with VPN client software can connect to their organization’s VPN server and receive access to their office’s data center. Using that connection, they can access the same files and resources as employees who are physically located in the building. This functionality made VPN a vital tool during the COVID-19 pandemic, when more than a third of the U.S. labor force worked from home, per Pew Research Center.
Several network types, associated topologies and methods of connectivity exist — even beyond this guide. A network professional learning to design a network might wonder which design is the best fit. The simple answer: There isn’t one. Choosing which type of network to configure largely depends on the purpose of the system.
Before network professionals decide which type of network to configure, they should first ask a series of questions about the system. Determining the use case of the network, the types of users and devices the network will serve, and the location of the network will help with the process of selecting the network type and connectivity to deploy.
Part of: The different types of networks and connectivity options
Networks differ based on size, connectivity, coverage and design. This guide explores seven common types of networks, including their benefits and use cases.
Network topology is essential to network configuration, as it determines the arrangement of a network and defines how nodes connect. Here are six common types of network topologies.
The four types of wireless networks — wireless LAN, wireless MAN, wireless PAN and wireless WAN — differ when it comes to size, range and connectivity requirements.
The goal of every network is to connect devices. The connections that form those links — such as wired cabling and wireless technologies — are crucial in network infrastructure.
Use these sample questions from CompTIA’s ‘Official CompTIA Network+ Self-Paced Study Guide (Exam N10-008)’ in preparation for your certification exam.
Zoom has added new Contact Center tools for supervisors and agents, giving management better insight into metrics while offering …
Apple’s executives say in-person collaboration is essential to the company’s innovative culture. Employees have asked the company…
Now that WFH collaboration is established at many organizations, companies need to review and revise their end-user device …
As mobile devices gain popularity as enterprise devices, mobile apps become a greater target for hackers. Understand the risks …
While there are many options for mobile applications that can help enterprise organizations accomplish business goals, some …
Samsung aims the new Fold4 directly at the business market with optimized versions of Google and Microsoft productivity apps. The…
File classification with File Server Resource Manager enables admins to classify and organize data. This tutorial shows how to …
Even with government money soon headed their way, top-tier semiconductor companies will still have to deal with a range of …
Blockchain has been a significant contributor to the global chip shortage. Explore the role this rising technology has played.
The virtualization company’s channel allies can expect new business models, metrics and specializations — along with a new owner…
The software company offers a range of partner opportunities as it pursues digital transformation and transitions from server …
A key index reports unexpected service sector growth, while digital services M&A could overtake 2021 deal volume and value levels…
All Rights Reserved, Copyright 2000 – 2022, TechTarget

Privacy Policy
Cookie Preferences
Do Not Sell My Personal Info


Leave a Reply

Your email address will not be published. Required fields are marked *