You are on page 1of 17

What is a Computer Network?

Computer Network links two or more computing devices and the computing hardware through
various communication channels (i.e. cables, telephone lines, radio waves, Wi-Fi, etc.) for data
and resource sharing. For example, Bluetooth connection to transfer files, a hotspot for sharing
the internet, etc.
A network could be small, inclusive of only one system, or as large as one may need.

Need for Computer Network


Resource Sharing- One can use a single resource to be shared along with multiple computers.
i.e. In an organization, we can use a single printer for various computers. Information Sharing-
One can share information with the help of networking. Communication- Ease of messaging.

Types of Computer Networks


There are various types of computer networks categorized by their size.
1. Personal Area Network(PAN)
2. Local Area Network (LAN)
3. Wide Area Network (WAN)
4. Wireless Local Area Network (WLAN)
5. Metropolitan Area Network (MAN)
6. Storage Area Network (SAN)
7. System-Area Network (SAN)
8. Passive Optical Local Area Network (POLAN)
9. Enterprise Private Network (EPN)
10. Virtual Private Network (VPN)
11. Home Area Network (HAN)

Personal Area Network(PAN)


It is the smallest and most basic type of computer network. The size of PAN varies from
centimeters to 30 meters. PAN network can be classified into two types
Wired PAN Network
Wireless PAN Network
Examples of PAN are – USB, Computer, Bluetooth, etc.

Advantages of PAN are-


Less Expensive
Confined to a small space area
Links to multiple devices concurrently

Disadvantages of PAN are-


Limited area
Slow Data Transmission
Interference with radio signal
Local Area Network (LAN)
LAN can be defined as a cluster of computers connected at a single physical location such as an
office, building, etc. It is the most common type of network used. A LAN can also be formed
with two computers connected over a network. Hub, Switches, Cables, and Optical fibers are
used to connect various computers and devices to a network.
Examples of LAN are networking in a home, school, college, office, etc.

Advantages of LAN are-


High data transfer rate
Ease of setup
Centralized Data
Low Cost

Disadvantages of LAN are-


Covers small area
The cables and connectors get damaged easily
Requires administrative time

Wide Area Network (WAN)


A WAN is a type of computer network that covers a large geographical area. WAN is also
defined as the connection of several LANs linked together to cover an entire city or country. The
WAN network is provided via several methods such as telephone lines, fiber optics cable, and
also through satellite links.
Advantages of WAN are-
Covers vast area
Multiple users can share and access the internet at the same time
High Bandwidth

Disadvantages of WAN are-


High initial investment cost
Hard to handle as the network is vast and complex.
Less secure
Local Area Network (WLAN)
WLAN functions like WAN but without cables i.e., these are wireless. WLAN allows devices to
connect wireless and it follows a standard called IEEE 802.11. WLAN connects laptops,
smartphones, personal digital assistants, desktop computers, printers, etc. It is easy to install
and use.

Advantages of WLAN are


Economical to use as it has smaller access to an area
Easier to provide connectivity in areas where cable laying is not possible
Easy to install as no cable layout is needed
Disadvantages of WLAN are-
Covers a limited area
Can interfere with other devices as it uses radio waves
Decrease in data transfer rate with increase in devices connected

Metropolitan Area Network (MAN)


This type of network is created by linking existing LAN networks to cover a large geographical
area. MAN is smaller than LAN but larger than WAN.
Examples of MAN are networking in government agencies, airports, libraries, etc.

Advantages of MAN are-


Offers Centralized data management
Quick transfer of files
Provides higher speed of internet as it uses fiber optics

Disadvantages of MAN are-


Difficult to handle due to large network size
Risk of hacking
High installation cost as it requires fiber optics
Storage Area Network(SAN)
This network is good for small businesses. SAN network comprises various switches, storage
devices, and storage elements that are interconnected with each other. SAN network does not
depend upon LAN or WAN networks.

Advantages of SAN are-


Improvised Data Security
Reduces LAN bandwidth problems
Dynamic failover protection
Disadvantages of SAN are-
Expensive
High maintenance
Complex in nature

System-Area Network (SAN)


SAN is a conglomeration of networks designed for high-speed interconnection in (server-server)
mode. It uses fiber optics to establish this fast connection.
Examples of SAN are Fiber channels, etc.
Advantages of SAN are-
Can handle large volumes of data
Ideal for high-level network performance
Has high bandwidth

Disadvantages of SAN are-


Hard to handle as the network is vast and complex.
Complex in nature
High initial cost

Passive Optical Local Area Network (POLAN)


POLAN functions in a similar way to LAN. It uses optical splitter instead of electrical powered
switches to separate and collect optical signals and is based on point to multipoint architecture.
Examples of POLAN are networking in medium-size companies, hospitals, hotels, etc.

Advantages of POLAN are


It is flexible
Economical and Environment Friendly
Low requirement of energy

Disadvantages of POLAN are-


Difficult to detect the failure in splitters
Includes Expensive components
Difficult in installation

Enterprise Private Network (EPN)


This is a type of private network mostly owned by businesses who want to connect their various
branches to share computer resources.
Examples of EPN are communication between the head and remote offices, connecting various
branches of a parent company, etc.

Advantages of EPN are-


Safe and secure network
Helps in centralizing the IT resources
Cost-effective for big companies

Disadvantages of EPN are-


High services fees
Coverage limitation
Difficult to set up

Virtual Private Network (VPN)


A VPN is a private network that connects remote users or sites using a public network. A VPN
uses tunneling or virtual point-to-point connection technology to connect which creates a
secure connection between the users or sites having the same IP address.

Advantages of VPN are


Helps in creating a virtual IP address
Bypasses Geo-Restrictions
Increases Online Privacy

Disadvantages of VPN are-


Dropped Connections
Data logging
Slow connection speeds

Home Area Network (HAN)


HAN is used to share various computers or peripheral devices used in the same home. There is
one device that acts as a centralized device for the function of Network Address
Translation(NAT).
Examples of HAN are printers, game systems, tablets, Wi-Fi, etc.

Advantages of HAN are-


Resource Sharing
Security
Multiuser

Disadvantages of HAN are-


Slow Connectivity
Expensive
High Security

Computer networks can be described based on their sizes and purpose. The most widely used
computer networks are LAN, WAN, MAN, and PAN. We have covered here various types of
networks with their advantages and disadvantages. Thanks for reading.
The basic difference between guided and unguided media is that in the guided media, the signal
travels through a physical medium whereas, in unguided media, the signal travel through the
air. There are some more differences between guided and unguided media which I have
discussed with the help of comparison chart shown below.
Ethernet: A system for connecting a number of computer systems to form a local area
network (LAN), with protocols to control the passing of information and to avoid simultaneous
transmission by two or more systems. Ethernet standards were developed by IEEE and named
as IEEE 802.3
MAKING A CONNECTIONS
TOOLS
Cat5e or cat-6 cable (any UTP cable used for data transfer)
RJ-45 connectors
Cable Stripper
Scissors
Crimping tool (Often crimping tool is equipped with striper and can cut a cable as well)

STEPS TO MAKE A CONNECTION


1. Strip the cable 1 to 1.5 inches. Avoid cutting into conductor insulation.
2. Spread the four pairs of wires apart.

STEPS TO MAKE A CONNECTION


3. Untwist the wire and arrange them according to 568-B scheme. 568-B WO-O-WG-B-WB-G-
WBR-BR
4. Cut the wires with scissor to align the ends.
5. Carefully insert the wires in the connector and make sure the wires reach their respective
conductors inside the connector.
6. Push the connector in the crimper tool and squeeze it.
7. Repeat the same steps for the other end of the cable.
8. Check the cable ends in Ethernet cable tester to make sure it
works.

TWISTED PAIR CABLES CONNECTION STANDARDS


 TIA/EIA-568-A and 568-B: Standards created by Telecommunication Industry
Association for the networking cables and other equipment used in communication of
different devices within a local area network.
 568-A and 568-B define schemes to connect a wire to connector’s interface using
specific colored wires.
 Wires are arranged according to these schemes to connect to the 8 conductors on the
RJ-45.
 Signal transmitting and receiving pins remain at same position in connector.

CROSS-OVER AND STRAIGHT THROUGH CABLES


 If same kind of color coding scheme is used at both ends of a cable it is called Straight
through cable.
 Either 568-A or 568-B is used on both ends. This kind of cable is commonly used to
connect unlike devices. For example, switch to a computer.
 If one end of the cable is connected using 568-A and other by 568-B, cable is called
cross-over cable.
 These kinds of cables are used to connect similar devices like hub to hub or computer to
computer connection.

Types of Router
Wireless Router
Wireless routers are the most commonly used routers in offices and homes as they don't need
any wire or cable to connect with networking devices.
It provides a secure connection, and only authenticated users can access the network using the
id & password.
It can be accessed by the n number of users within the specified range.

Wired Router/Broadband Router


As its name suggests, it requires a wire or cable to connect to the network devices.
Such routers are used mostly in schools or small offices to connect the PCs with the Ethernet
cable.
It also has a Wi-Fi access point, and a mobile phone can be connected to it using the VOIP
(Voice-over-Internet Protocol) technology.
It is connected to the ADSL modems to take the transmission data from the modem and
distribute it to a further network.

Edge Router
Edge router can be either Wired/Wireless types that transmit the data packet between two or
more networks, not within a network.
These routers are placed at the edge of networks, hence called Edge router, and connect with
ISP or another network in an organization.
The main task of the edge router is to maintain smooth communication between the networks.
Core Router
The core routers are also wired/wireless routers, which distribute the data packets within a
network, not between two networks.
These are designed to become the backbone of a network and allow the heavy transfer of data.

Virtual Router
This software allows the computers and servers to operate like routers and share data packets
similar to the physical ones.
These are more flexible than the physical, as they can be scaled up as per the business
requirement.

What is data communication? What are the four fundamental


characteristics of data communication?
The word data refers to information presented in whatever form is agreed upon by the parties creating
and using the data. Data communications are the exchange of data between two devices via some form
of transmission medium such as a wire cable. For data communications to occur, the communicating
devices must be part of a communication system made up of a combination of hardware (physical
equipment) and software (programs). The effectiveness of a data communications system depends on
four fundamental characteristics: delivery, accuracy, timeliness, and jitter.

Delivery- The system must deliver data to the correct destination. Data must be received by the
intended device or user and
only by that device or user.

Accuracy- The system must deliver the data accurately. Data that have been altered in transmission and
left uncorrected are
unusable.

Timeliness- The system must deliver data in a timely manner. Data delivered late are useless. In the case
of video and audio,
timely delivery means delivering data as they are produced, in the same order that they are produced,
and without significant
delay. This kind of delivery is called real-time transmission.

Jitter- Jitter refers to the variation in the packet arrival time. It is the uneven delay in the delivery of
audio or video packets.
For example, let us assume that video packets are sent every 3D Ms. If some of the packets arrive with
3D-ms delay and others
with 4D-ms delay, an uneven quality in the video is the result.

Explain various types of Data Representation techniques.


Information today comes in different forms such as text, numbers, images, audio, and video.
Text- In data communications, text is represented as a bit pattern, a sequence of bits (Os or Is). Different
sets of bit patterns have been designed to represent text symbols. Each set is called a code, and the
process of representing symbols is called coding. Today, the prevalent coding system is called Unicode,
which uses 32 bits to represent a symbol or character used in any language in the world.
The American Standard Code for Information Interchange (ASCII), developed some decades ago in the
United States, now constitutes the first 127 characters in Unicode and is also referred to as Basic Latin.

Numbers-Numbers are also represented by bit patterns. However, a code such as ASCII is not used to
present numbers; the number is directly converted to a binary number to simplify mathematical
operations.

Images-Images are also represented by bit patterns. In its simplest form, an image is composed of a
matrix of pixels (picture elements), where each pixel is a small dot. The size of the pixel depends on the
resolution. For example, an image can be divided into 1000 pixels or 10,000 pixels. In the second case,
there is a better representation of the image (better resolution), but more memory is needed to store
the image. After an image is divided into pixels, each pixel is assigned a bit pattern. The size and the
value of the pattern depend on the image. For an image made of only black and white dots (e.g., a
chessboard), a Ibit pattern is enough to represent a pixel. If an image is not made of pure white and pure
black pixels, you can increase the size
of the bit pattern to include gray scale. For example, to show four levels of gray scale, you can use 2-bit
patterns. A black pixel can be represented by 00, a dark gray pixel by 01, a light gray pixel by 10, and a
white pixel by 11.
There are several methods to represent color images. One method is called RGB, so called because each
color is made of a combination of three primary colors: red, green, and blue. The intensity of each color
is measured, and a bit pattern is assigned to it. Another method is called YCM, in which a color is made
of a combination of three other primary colors: yellow, cyan, and magenta.

Audio-Audio refers to the recording or broadcasting of sound or music. Audio is by nature different from
text, numbers, or images. It is continuous, not discrete. Even when we use a microphone to change
voice or music to an electric signal, we create a continuous signal.

Video-Video refers to the recording or broadcasting of a picture or movie. Video can either be produced
as a continuous entity (e.g., by a TV camera), or it can be a combination of images, each a discrete
entity, arranged to convey the idea of motion. Again we can change video to a digital or an analog signal.

Explain the five components of Data Communication System?


The five components are:
Message - It is the information to be communicated. Popular forms of information include text, pictures,
audio, video etc.
Text is converted to binary, number does not convert, image is converted to pixels, etc.

Sender - It is the device which sends the data messages. It can be a computer, workstation, telephone
handset etc.

Receiver - It is the device which receives the data messages. It can be a computer, workstation,
telephone handset etc.
Transmission Medium - It is the physical path by which a message travels from sender to receiver. Some
examples include
twisted-pair wire, coaxial cable, radio waves etc.

Protocol - It is a set of rules that governs the data communications. It represents an agreement between
the communicating devices. Without a protocol, two devices may be connected but not communicating.

Explain the Communication Model with example.


The fundamental purpose of a communications system is the exchange of data between two parties. Let
us consider a simple communication model Figure(a), the key elements of the model are,

Source: This device generates the data to be transmitted; examples are telephones and personal
computers.

Transmitter: the data generated by a source system are not transmitted directly in the form in which
they were generated. A transmitter transforms and encodes the information in the form which is
suitable for the transmission and then transmit it across a transmission system.

Transmission System: This can be a single transmission line or media that connects source and
destination and share data between both entities.

Receiver: The receiver accepts the signal from the transmission system and converts it into a form that
can be handled by the destination device (original form in which the data was generated by source)

Destination: Takes the incoming data from the receiver.

Data Communication System Tasks


There are some tasks performed by the communication systems are

1. Signal Generation-To transmit the data over the transmission system, communicating device must be
able to generate and receive these signals.

2. Interface-Device must interface with the transmission system to communicate or transfer the data
over network.

3. Data Synchronization-It is the process of establishing consistency among data from a source to
destination devices and vice versa and continuous harmonization of the data over time.

4. Error Detection and Correction-In any communication system transmitted data is prone to error.
Either
it is because of transmitted signal getting distorted in the transmission medium leading to
misinterpretation of signal or errors introduced by the intermediate devices. Error detection and
correction is required in cases where there is no scope for error in the data transaction.
5. Flow Control-At the time of transmission of data, source computer is generating data faster than
receiver device capable to receive it. To handle such problem, there is some kind of flow control
mechanism used

6.Addressing: when more than two devices share a transmission facility, a source system must
somehow indicate the identity or address of the destination. Addresses are in form of IP.
7. Routing-Routing means to send data to appropriate destinations. It is used to find shortest path
among devise or server.

Data Flow techniques simplex, half duplex, full duplex with the help of diagram.
Transmission mode refers to the mechanism of transferring of data between two devices connected
over a network. It is also called Communication Mode. These modes direct the direction of flow of
information. There are three types of transmission modes. They are:
1. Simplex Mode
2. Half duplex Mode
3. Full duplex Mode

1. SIMPLEX Mode
In this type of transmission mode, data can be sent only in one direction i.e. communication is
unidirectional. We cannot send a message back to the sender. Unidirectional communication is done in
Simplex Systems where we just need to send a command/signal, and do not expect any response back.
Examples of simplex Mode are loudspeakers, television broadcasting, television and remote, keyboard
and monitor etc.

2. HALF DUPLEX Mode


Half-duplex data transmission means that data can be transmitted in both directions on a signal carrier,
but not at the same time.
For example, on a local area network using a technology that has half-duplex transmission, one
workstation can send data on the line and then immediately receive data on the line from the same
direction in which data was just transmitted. Hence half
duplex transmission implies a bidirectional line (one that can carry data in both directions) but data can
be sent in only one direction at a time.
Example of half duplex is a walkie- talkie in which message is sent one at a time but messages are sent in
both the directions.

3. FULL DUPLEX Mode


In full duplex system we can send data in both the directions as it is bidirectional at the same time in
other words, data can be sent in both directions simultaneously.
Example of Full Duplex is a Telephone Network in which there is communication between two persons
by a telephone line, using which both can talk and listen at the same time.
In full duplex system there can be two lines one for sending the data and the other for receiving data.

Criteria for a Data Communication Network


The major criteria that a Data Communication Network must meet are:
1. Performance
2. Reliability
3. Security
1. Performance:
It can be measured in many ways, including transmit time and response time. Performance is a
measurement of various factors such as the amount of time requires for messages to travel from one
device to another, the time it requires to get a response starting from an inquiry. Performance of a
network, however also depends on a number of factors such as number of active users, type of the
transmission medium, capabilities of the connected hardware and efficiency of the software etc.

2. Reliability: It is measured by frequency of failure, the time it takes a link to recover from a failure, and
the network’s
robustness. Network reliability is measured by the frequency of failure, time it takes to recover from
failure, the network’s
robustness.

3. Security: Security issues include protecting data from unauthorized access and virus. Network must
be secured. The data
that is sent should reach its destination safely without any third-party reading or altering or destroying
the data in the midway.

How can computer network be classified? Types of Connection in Computer


Networks.
A Network is nothing but a connection made through connection links between two or more devices.
Devices can be a computer, printer or any other device that is capable to send and receive data. There
are two ways to connect the devices:
1. Point-to-Point connection
2. Multipoint connection

1. Point-To-Point Connection
It is a protocol which is used as a communication link between two devices. It is simple to establish. The
most common example for Point-to-Point connection (PPP) is a computer connected by telephone line.
We can connect the two devices by means of a pair of wires or using a microwave or satellite link.
Example: Point-to-Point connection between remote control and Television for changing the channels.

2. Multipoint Connection
It is also called Multidrop configuration. In this connection two or more devices share a single link. There
are two kinds of Multipoint Connections:
If the links are used simultaneously between many devices, then it is spatially shared line configuration.
If user takes turns while using the link, then it is time shared (temporal) line configuration.

Types of Network Topology


Network Topology is the schematic description of a network arrangement, connecting various nodes
(sender and receiver) through lines of connection.

BUS Topology
Bus topology is a network type in which every computer and network device is connected to single
cable. When it has exactly two endpoints, then it is called Linear Bus topology.

Features of Bus Topology


1. It transmits data only in one direction. 2. Every device is connected to a single cable

Advantages of Bus Topology


1. It is cost effective. 2. Cable required is least compared to other network topology.
3. Used in small networks. 4. It is easy to understand.
5. Easy to expand joining two cables together.

Disadvantages of Bus Topology


1. Cables fails then whole network fails.
2. If network traffic is heavy or nodes are more the performance of the network decreases.
3. Cable has a limited length.
4. It is slower than the ring topology.

RING Topology
It is called ring topology because it forms a ring as each computer is connected to another computer,
with the last one connected to the first. Exactly two neighbors for each device.

Features of Ring Topology


1. A number of repeaters are used for Ring topology with large number of nodes, because if someone
wants to send some
data to the last node in the ring topology with 100 nodes, then the data will have to pass through 99
nodes to reach the
100th node. Hence to prevent data loss repeaters are used in the network.

2. The transmission is unidirectional, but it can be made bidirectional by having 2 connections between
each Network
Node, it is called Dual Ring Topology.

3. In Dual Ring Topology, two ring networks are formed, and data flow is in opposite direction in them.
Also, if one ring
fails, the second ring can act as a backup, to keep the network up.

4. Data is transferred in a sequential manner that is bit by bit. Data transmitted, has to pass through
each node of the
network, till the destination node.

Advantages of Ring Topology


1. Transmitting network is not affected by high traffic or by adding more nodes, as only the nodes having
tokens can
transmit data.
2. Cheap to install and expand

Disadvantages of Ring Topology


1. Troubleshooting is difficult in ring topology.
2. Adding or deleting the computers disturbs the network activity.
3. Failure of one computer disturbs the whole network.

STAR Topology
In this type of topology all the computers are connected to a single hub through a cable. This hub is the
central node and all others nodes are connected to the central node.

Features of Star Topology


1. Every node has its own dedicated connection to the hub.
2. Hub acts as a repeater for data flow.
3. Can be used with twisted pair, Optical Fiber or coaxial cable.

Advantages of Star Topology


1. Fast performance with few nodes and low network traffic.
2. Hub can be upgraded easily.
3. Easy to troubleshoot.
4. Easy to setup and modify.
5. Only that node is affected which has failed, rest of the nodes can work smoothly.

Disadvantages of Star Topology


1. Cost of installation is high. 2. Expensive to use.
3. If the hub fails then the whole network is stopped because all the nodes depend on the hub.
4. Performance is based on the hub that is it depends on its capacity

MESH Topology
It is a point-to-point connection to other nodes or devices. All the network nodes are connected to each
other. Mesh has n (n- 1)/2 physical channels to link n devices.
There are two techniques to transmit data over the Mesh topology, they are:
1. Routing
2. Flooding

MESH Topology: Routing


In routing, the nodes have a routing logic, as per the network requirements. Like routing logic to direct
the data to reach the destination using the shortest distance. Or, routing logic which has information
about the broken links, and it avoids those node etc. We can even have routing logic, to re-configure the
failed nodes.

MESH Topology: Flooding


In flooding, the same data is transmitted to all the network nodes, hence no routing logic is required.
The network is robust, and the its very unlikely to lose the data. But it leads to unwanted load over the
network.

Types of Mesh Topology

1. Partial Mesh Topology: In this topology some of the systems are connected in the same fashion as
mesh topology but
some devices are only connected to two or three devices.

2. Full Mesh Topology: Each and every nodes or devices are connected to each other.

Features of Mesh Topology


1. Fully connected. 2. Robust. 3. Not flexible.

Advantages of Mesh Topology


1.Each connection can carry its own data load. 2. It is robust.

Disadvantages of Mesh Topology


1. Installation and configuration is difficult.
2. Cabling cost is more. 3. Bulk wiring is required.
3. Fault is diagnosed easily.
4. Provides security and privacy.

TREE Topology
It has a root node and all other nodes are connected to it forming a hierarchy. It is also called
hierarchical topology. It should at least have three levels to the hierarchy.

Features of Tree Topology


1. Ideal if workstations are located in groups. 2. Used in Wide Area Network.

Advantages of Tree Topology


1. Extension of bus and star topologies. 2. Expansion of nodes is possible and easy.
3. Easily managed and maintained. 4. Error detection is easily done.

Disadvantages of Tree Topology


1. Heavily cabled. 2. Costly.
3. If more nodes are added maintenance is difficult. 3. Central hub fails, network fails.

HYBRID Topology
It is two different types of topologies which is a mixture of two or more topologies. For example, if in an
office in one department ring topology is used and in another star topology is used, connecting these
topologies will result in Hybrid Topology (ring topology and star topology).

Features of Hybrid Topology


1. It is a combination of two or topologies
2. Inherits the advantages and disadvantages of the topologies included
Advantages of Hybrid Topology
1. Reliable as Error detecting and troubleshooting is easy. 2. Effective.

Disadvantages of Hybrid Topology


1. Complex in design.
2. 2. Costly.
3. Scalable as size can be increased easily.
4. Flexible.
Categories of Network or Types of Computer Network
Computer Network is a system of interconnected computers that enable the computers to communicate
with each other and share their resources, data and applications.

1) Local Area Network (LAN)


LAN is a group of computers, that are connected in a small area such as building, home, etc. Through
this type of network, users can easily communicate with each other by sending and receiving messages.
LAN is generally used for connecting two or more personal computers through some medium such as
twisted pair, coaxial cable etc. Through the number of computers connected in a LAN is limited, the data
is transferred at an extremely faster rate.

2) Metropolitan Area Network (MAN)


MAN is a network of computers that covers a large area like city. The size of the MAN generally lies
between LAN and WAN, typically covering a distance of 5 km to 50 km. The geographical area covered
by MAN is comparatively larger than LAN but smaller than WAN. MAN is generally owned by private
organizations. MAN is generally connected with the help of optical fibers, copper wires etc. One of the
most common examples of MAN is cable television network within a city as shown in Fig. A network
device known as router is used to connect the LANs together. The router directs the information packets
to the desired destination.
NPE-N/w Processing Engine

3) Wide Area Network (WAN)


WAN is a group of computers that are connected in a large area such as continent, country, etc. WAN is
generally used for connecting two or more LANs through some medium such as leased telephone lines,
microwaves, etc. In WAN, data is transferred at slow rate .

Modes of Data Transmission:


They define the direction in which data flows between two communicating
devices. There are three types of transmission modes:

1. Simplex - In this mode of transmission, data can only move to one


direction i.e., a device can only send data but cannot receive and the
receiver can only receive but cannot send the data.

2. Half-Duplex - In this mode, only one device can send or receive data at
a time but not both at the same time.

3. Full-Duplex - In this mode, a device can send and receive data at the
same time.

You might also like