Professional Documents
Culture Documents
Prepared by:
RAYMOND G. PUNO
Teacher I
Technology made a huge breakthrough in 1936 when the first computer was invented.
However, it wasn’t until years later in 1969 that the first-ever computer-to-computer link was
established. This development was what ultimately paved the way for the Internet-driven
world we live in today.
So, what is a network? It’s the connection of two or more computers that are linked in
order to share files, resources, and allow communication. The type of network depends on the
number of devices, as well as the location and distance between each.
Computer networks come in many forms: home networks, business networks, and the
internet are three common examples. Devices may use any of several methods to connect to
these (and other kinds of) networks. Two basic types of network connections exist:
• Point-to-point connections allow one device to communicate with one other device.
For example, two phones may pair with each other to exchange contact information or
pictures.
• Multipoint connections allow one device to connect and deliver messages to multiple
devices in parallel.
Personal Area Network (PAN) is a network arranged within an individual person. This is
the smallest and most basic network that you’ll find. It’s meant to cover a very small area.
A PAN is most commonly used for one individual and to connect just a handful of devices
such as a computer, smart phone, and printer. Probably the most well-known PAN
technology is Bluetooth connection.
Local Area Network is a group of computers connected to each other in a small area
such as building, office. LAN is used for connecting two or more personal computers
through a communication medium such as twisted pair, coaxial cable, etc. It is less costly
as it is built with inexpensive hardware such as hubs, network adapters, and ethernet
cables. The data is transferred at an extremely faster rate in Local Area Network. Local Area
Network provides higher security.
Originally used in universities and research labs, today LANs are in use everywhere,
including in the home and business. Information sharing and communication between
devices over different topologies is possible with Wi-Fi or TCP/IP Ethernet.
Example of a LAN
A WLAN is simply a LAN that does not rely on cables to connect to the network. So,
when you’re using WiFi, you’re using a WLAN. WLANs are typically used in the same
scenario as LANs, it just depends on whether you’d prefer an on premises or remote cloud
solution (wires or wireless).
Larger than LANs, but smaller than metropolitan area networks (MANs, explained
below), these types of networks are typically seen in universities, large K-12 school districts
or small businesses. They can be spread across several buildings that are fairly close to each
other so users can share resources.
With a campus area network (CAN), universities, colleges, and corporate campuses
connect different LANs from various departments sharing a common area. This transforms
otherwise scattered networks into a collective network that provides access to information
at breathtaking speeds while ensuring the necessary authentication to prevent privacy
loopholes.
CANs are similar to LANs in operational approach, but differ in size to these types of
networks. Users who access a CAN with different devices often do so with Wi-Fi, hotspots,
and Ethernet technology.
Example of a CAN
Illustration of a CAN – Different LANs in building connected to schools central device via cable or Wi-Fi
Larger than a LAN but smaller than a WAN, a MAN incorporates elements of both types
of networks. It connects multiple LANs together and spans an entire geographical area such
as a city or town (or sometimes a campus). Ownership and management can be handled
by a single person, but it’s more likely done by a larger company or organization.
A metropolitan area network (MAN) ticks both boxes by using technologies such as
fiber optics, dense wavelength division multiplexing, and optical packet switching.
Often referred to as medium-sized networks, MANs covers an area larger than a LAN,
but smaller than a WAN. They consist of different LANs interconnected with point-to-point
high-capacity backbone technology and can span several buildings or a metropolis.
Through shared regional resources, MANs can take the form of cable TV network, or even
telephone networks that provide high-speed DSL lines.
Example of a MAN
Multiple LANs in a
municipality/ town connected
to a central unit (preferably a
router). It may be connected
wirelessly or wired.
Illustration of a MAN – Different LANs in building connected to a municipal/ town central device via cable or
Wi-Fi
When to use a MAN:
• You have devices spread over a regional geography that need to communicate
directly with each other.
• You have the ability to provide connectivity, wired or wireless, between each
location.
Like LANs, you very well may recognize the term “WAN.” WANs do the same thing as
LANs but across a larger area while connecting more devices. Even when miles apart, a
WAN can connect devices together remotely.
In fact, the most basic example of a WAN is the Internet which connects computers and
devices worldwide. Since it’s much larger, this type of network is typically maintained by
multiple administrators and ownership is distributed across various organizations.
Example of a WAN
The point of a VPN is to increase security and privacy while accessing a network. The
VPN acts as a middleman between you and the network by encrypting your data and hiding
your identity. This is a great option for sending and receiving sensitive information,
however, using a VPN is ideal anytime you connect to the Internet. Anytime you’re on a
public network, you run the risk of being targeted by a hacker, so using a VPN is you best
bet at ensuring your cybersecurity.
This is achieved with a VPN tunnel that’s created between two communicating devices,
encapsulating and encrypting the data transferred between the two devices. Typically a
VPN is used when the two devices are connected over a public network, such as the
internet. The extra protection offered by the VPN tunnel prevents sensitive information
such as IP addresses, surfing history, communication with a corporate office, or even
travelling plans from being exposed online.
The level of security surrounding a data packet depends on the type of VPN tunnel
used. Typical VPN tunnels include point-to-point tunneling protocol (PPTP), Secure Socket
Tunneling Protocol (SSTP), L2TP/IPsec, and OpenVPN.
Layer 2 Tunneling Protocol (L2TP) which uses the Internet Protocol Security (IPsec)
protection typically does so with AES-256 bit encryption, an advanced encryption standard
considered to be the strongest available for all types of network connections.
There are different types of VPNs, which can generally be split into two categories:
remote access VPN and site-to-site VPN. With remote access VPNs, users securely connect
their devices to the corporate office. With site-so-site VPN, connection is done from a
corporate office to branch.
Illustration of a VPN – Adding layer/ way (secure lane of connection) to your internet connection while using
the internet
Chapter 6 – Network types
Activity Sheet
Activity 1 – Identiifcation
Direction. Identify what is being described in each statement. Write your answers on your
answer sheets.
_______ 1. It’s the connection of two or more computers that are linked in order to share files,
resources, and allow communication.
_______ 2. This is the smallest and most basic network there is.
_______ 3. A group of computers connected to each other in a small area such as building.
_______ 4. With this network, schools connect different LANs from various departments
sharing a common area.
_______ 5. They consist of different LANs interconnected with point-to-point high-capacity
backbone technology and can span a town o city.
_______ 6. Its basic example is the Internet.
_______ 7. It increases security and privacy while accessing a network.
_______ 8. What technology is used in a Personal Area Network?
_______ 9. What network device is used in a WLAN?
_______ 10. Give one security level of a VPN.
_______ 11. What technology is used in a WLAN?
_______ 12. Is LAN wired or wireless?
_______ 13. When sending and receiving sensitive information, what will you use to ensure
that the data is protected from hackers?
_______ 14. What network will you setup if your devices don’t support a type of wired network
connection.
_______ 15. What network is used in a computer laboratory?