You are on page 1of 54

FUNDAMENTAL OF

COMPUTER &
INFORMATION
TECHNOLOGY

virajrajput1997@gmail.com
Data Communication & Networks
 Data communications refers to the transmission of this digital data
between two or more computers and a computer network or data
network is a telecommunications network that allows computers to
exchange data. The physical connection between networked
computing devices is established using either cable media or wireless
media. The best-known computer network is the Internet.

Applications of Communication & Computer Network

Exchange of information by means of e-Mails and FTP


IP phones
Video conferences
Instant messaging
Parallel computing

virajrajput1997@gmail.com
Networks
 A system of interconnected computers and computerized
peripherals such as printers is called computer network. This
interconnection among computers facilitates information
sharing among them. Computers may connect to each other
by either wired or wireless media.

Classification of Computer Networks

 Computer networks are classified based on various factors. They


includes:

 Geographical span
 Inter-connectivity
 Administration
 Architecture
virajrajput1997@gmail.com
Geographical Span
Geographically a network can be seen in one of the following categories:
 It may be spanned across your table, among Bluetooth enabled devices,.
Ranging not more than few meters.
 It may be spanned across a whole building, including intermediate devices to
connect all floors.
 It may be spanned across a whole city.
 It may be spanned across multiple cities or provinces.
 It may be one network covering whole world.

Inter-Connectivity
Components of a network can be connected to each other differently
in some fashion. By connectedness we mean either logically , physically
, or both ways.
 Every single device can be connected to every other device on network,
making the network mesh.
 Each device is connected to its left and right peers only, creating linear
structure.
 All devices connected together with a single device, creating star like
structure.
virajrajput1997@gmail.com
Administration
 From an administrator’s point of view, a network can be
private network which belongs a single autonomous system
and cannot be accessed outside its physical or logical
domain.A network can be public which is accessed by all.
Architecture
Computer networks can be discriminated into various types
such as Client-Server, peer-to-peer or hybrid, depending upon
its architecture.
 There can be one or more systems acting as Server. Other
being Client, requests the Server to serve requests. Server
takes and processes request on behalf of Clients.
 Two systems can be connected Point-to-Point, or in back-to-
back fashion. They both reside at the same level and called
peers.
 There can be hybrid network which involves network
architecture of both the above types.
virajrajput1997@gmail.com
Modes of Communication

 The way in which data is transmitted from one device


to another device is known as transmission mode.
 The transmission mode is also known as the
communication mode.
 Each communication channel has a direction associated
with it, and transmission media provide the direction.
Therefore, the transmission mode is also known as a
directional mode.
 The transmission mode is defined in the physical layer.

virajrajput1997@gmail.com
Analog Signals
 An analog signal is time-varying and generally bound to a range
(e.g. +12V to -12V), but there is an infinite number of values
within that continuous range. An analog signal uses a given
property of the medium to convey the signal’s information, such
as electricity moving through a wire. In an electrical signal, the
voltage, current, or frequency of the signal may be varied to
represent the information. Analog signals are often calculated
responses to changes in light, sound, temperature, position,
pressure, or other physical phenomena.

virajrajput1997@gmail.com
Digital Signals
A digital signal is a signal that represents data as a sequence
of discrete values. A digital signal can only take on one value
from a finite set of possible values at a given time. With
digital signals, the physical quantity representing the
information can be many things:
  Variable electric current or voltage
 Phase or polarization of an electromagnetic field
 Acoustic pressure
 The magnetization of a magnetic storage media

virajrajput1997@gmail.com
Modem
 Modem is abbreviation for Modulator – De-
modulator. Modems are used for data transfer from
one computer network to another computer network
through telephone lines. The computer network works in
digital mode, while analog technology is used for carrying
massages across phone lines.
 Modulator converts information from digital mode to analog
mode at the transmitting end and de-modulator converts the
same from analog to digital at receiving end. The process of
converting analog signals of one computer network into
digital signals of another computer network so they can be
processed by a receiving computer is referred to as digitizing.

virajrajput1997@gmail.com
What is Topology?

 Topology defines the structure of the network of how


all the components are interconnected to each other.
There are two types of topology: physical and logical
topology.

virajrajput1997@gmail.com
Bus Topology
 The bus topology is designed in such a way that all the
stations are connected through a single cable known as a
backbone cable.
 Each node is either connected to the backbone cable by
drop cable or directly connected to the backbone cable.
 When a node wants to send a message over the network,
it puts a message over the network. All the stations
available in the network will receive the message whether
it has been addressed or not.
 The backbone cable is considered as a "single
lane" through which the message is broadcast to all the
stations.

virajrajput1997@gmail.com
Advantages of Bus topology:

 Low-cost cable: In bus topology, nodes are directly


connected to the cable without passing through a hub.
Therefore, the initial cost of installation is low.
 Moderate data speeds: Coaxial or twisted pair cables are
mainly used in bus-based networks that support upto 10
Mbps.
 Familiar technology: Bus topology is a familiar technology
as the installation and troubleshooting techniques are well
known, and hardware components are easily available.
 Limited failure: A failure in one node will not have any
effect on other nodes.

virajrajput1997@gmail.com
Disadvantages of Bus topology:

 Difficult troubleshooting: It requires specialized


test equipment to determine the cable faults. If
any fault occurs in the cable, then it would disrupt
the communication for all the nodes.
 Signal interference If two nodes send the
messages simultaneously, then the signals of both
the nodes collide with each other.
 Reconfiguration difficult: Adding new devices to
the network would slow down the network.

virajrajput1997@gmail.com
Ring Topology
 Ring topology is like a bus topology, but with
connected ends.
 The node that receives the message from the previous
computer will retransmit to the next node.
 The data flows in one direction, i.e., it is unidirectional.
 The data flows in a single loop continuously known as
an endless loop.
 It has no terminated ends, i.e., each node is connected
to other node and having no termination point.
 The data in a ring topology flow in a clockwise
direction.

virajrajput1997@gmail.com
 The most common access method of the ring topology
is token passing.
 Token passing: It is a network access method in which
token is passed from one node to another node.
 Token: It is a frame that circulates around the network.

Working of Token passing


 A token moves around the network, and it is passed from
computer to computer until it reaches the destination.
 The sender modifies the token by putting the address along
with the data.
 The data is passed from one device to another device until
the destination address matches. Once the token received
by the destination device, then it sends the
acknowledgment to the sender.
 In a ring topology, a token is used as a carrier.

virajrajput1997@gmail.com
Advantages of Ring topology:

 Network Management: Faulty devices can be


removed from the network without bringing the
network down.
 Product availability: Many hardware and software
tools for network operation and monitoring are
available.
 Cost: Twisted pair cabling is inexpensive and easily
available. Therefore, the installation cost is very
low.
 Reliable: It is a more reliable network because the
communication system is not dependent on the
single host computer.

virajrajput1997@gmail.com
Disadvantages of Ring topology:

 Difficult troubleshooting: It requires specialized test


equipment to determine the cable faults. If any fault
occurs in the cable, then it would disrupt the
communication for all the nodes.
 Failure: The breakdown in one station leads to the
failure of the overall network.
 Reconfiguration difficult: Adding new devices to the
network would slow down the network.
 Delay: Communication delay is directly proportional
to the number of nodes. Adding new devices
increases the communication delay.

virajrajput1997@gmail.com
Star Topology
 Star topology is an arrangement of the network in which every
node is connected to the central hub, switch or a central
computer.
 The central computer is known as a server, and the peripheral
devices attached to the server are known as clients.
 Coaxial cable or RJ-45 cables are used to connect the computers.
 Hubs or Switches are mainly used as connection devices in
a physical star topology.
 Star topology is the most popular topology in network
implementation.

virajrajput1997@gmail.com
Advantages of Star topology

 Network control: Complex network control features can be


easily implemented in the star topology. Any changes made
in the star topology are automatically accommodated.
 Limited failure: As each station is connected to the central
hub with its own cable, therefore failure in one cable will
not affect the entire network.
 Familiar technology: Star topology is a familiar technology
as its tools are cost-effective.
 Easily expandable: It is easily expandable as new stations
can be added to the open ports on the hub.
 High data speeds: It supports a bandwidth of approx
100Mbps. Ethernet 100BaseT is one of the most popular
Star topology networks.

virajrajput1997@gmail.com
Disadvantages of Star topology

 A Central point of failure: If the central hub or


switch goes down, then all the connected
nodes will not be able to communicate with
each other.
 Cable: Sometimes cable routing becomes
difficult when a significant amount of routing is
required.

virajrajput1997@gmail.com
Tree topology
 Tree topology combines the characteristics of bus
topology and star topology.
 A tree topology is a type of structure in which all the
computers are connected with each other in hierarchical
fashion.
 The top-most node in tree topology is known as a root
node, and all other nodes are the descendants of the
root node.
 There is only one path exists between two nodes for the
data transmission. Thus, it forms a parent-child hierarchy.

virajrajput1997@gmail.com
Advantages of Tree topology
 Support for broadband transmission: Tree topology is
mainly used to provide broadband transmission, i.e.,
signals are sent over long distances without being
attenuated.
 Easily expandable: We can add the new device to the
existing network. Therefore, we can say that tree topology
is easily expandable.
 Easily manageable: In tree topology, the whole network is
divided into segments known as star networks which can
be easily managed and maintained.
 Error detection: Error detection and error correction are
very easy in a tree topology.
 Limited failure: The breakdown in one station does not
affect the entire network.
 Point-to-point wiring: It has point-to-point wiring for
virajrajput1997@gmail.com
Disadvantages of Tree topology

 Difficult troubleshooting: If any fault occurs in the node,


then it becomes difficult to troubleshoot the problem.
 High cost: Devices required for broadband transmission
are very costly.
 Failure: A tree topology mainly relies on main bus cable
and failure in main bus cable will damage the overall
network.
 Reconfiguration difficult: If new devices are added, then
it becomes difficult to reconfigure.

virajrajput1997@gmail.com
Hybrid Topology
 The combination of various different topologies is known
as Hybrid topology.
 A Hybrid topology is a connection between different links
and nodes to transfer the data.
 When two or more different topologies are combined
together is termed as Hybrid topology and if similar
topologies are connected with each other will not result in
Hybrid topology. For example, if there exist a ring topology
in one branch of ICICI bank and bus topology in another
branch of ICICI bank, connecting these two topologies will
result in Hybrid topology.

virajrajput1997@gmail.com
Advantages of Hybrid Topology

 Reliable: If a fault occurs in any part of the network will


not affect the functioning of the rest of the network.
 Scalable: Size of the network can be easily expanded
by adding new devices without affecting the
functionality of the existing network.
 Flexible: This topology is very flexible as it can be
designed according to the requirements of the
organization.
 Effective: Hybrid topology is very effective as it can be
designed in such a way that the strength of the
network is maximized and weakness of the network is
minimized.
virajrajput1997@gmail.com
Disadvantages of Hybrid topology

 Complex design: The major drawback of the


Hybrid topology is the design of the Hybrid
network. It is very difficult to design the
architecture of the Hybrid network.
 Costly Hub: The Hubs used in the Hybrid topology
are very expensive as these hubs are different from
usual Hubs used in other topologies.
 Costly infrastructure: The infrastructure cost is
very high as a hybrid network requires a lot of
cabling, network devices, etc.

virajrajput1997@gmail.com
Transmission modes
 The way in which data is transmitted from one device to
another device is known as transmission mode.
 The transmission mode is also known as the
communication mode.
 Each communication channel has a direction associated
with it, and transmission media provide the direction.
Therefore, the transmission mode is also known as a
directional mode.
 The transmission mode is defined in the physical layer

The Transmission mode is divided into three categories:


Simplex mode
Half-duplex mode
Full-duplex mode
virajrajput1997@gmail.com
Simplex mode
 In Simplex mode, the communication is unidirectional, i.e.,
the data flow in one direction.
 A device can only send the data but cannot receive it or it
can receive the data but cannot send the data.
 This transmission mode is not very popular as mainly
communications require the two-way exchange of data.
The simplex mode is used in the business field as in sales
that do not require any corresponding reply.
 Keyboard and Monitor are the examples of the simplex
mode as a keyboard can only accept the data from the
user and monitor can only be used to display the data on
the screen.

virajrajput1997@gmail.com
Advantage of Simplex mode:
 In simplex mode, the station can utilize the
entire bandwidth of the communication
channel, so that more data can be transmitted
at a time.

Disadvantage of Simplex mode:

 Communication is unidirectional, so it has no


inter-communication between devices.

virajrajput1997@gmail.com
Half-Duplex mode
 In a Half-duplex channel, direction can be reversed, i.e., the
station can transmit and receive the data as well.
 Messages flow in both the directions, but not at the same time.
 The entire bandwidth of the communication channel is utilized
in one direction at a time.
 In half-duplex mode, it is possible to perform the error
detection, and if any error occurs, then the receiver requests
the sender to retransmit the data.
 A Walkie-talkie is an example of the Half-duplex mode. In
Walkie-talkie, one party speaks, and another party listens. After
a pause, the other speaks and first party listens. Speaking
simultaneously will create the distorted sound which cannot be
understood.

virajrajput1997@gmail.com
Advantage of Half-duplex mode

 In half-duplex mode, both the devices can send


and receive the data and also can utilize the
entire bandwidth of the communication channel
during the transmission of data.

Disadvantage of Half-Duplex mode

 In half-duplex mode, when one device is sending


the data, then another has to wait, this causes
the delay in sending the data at the right time.

virajrajput1997@gmail.com
Full-duplex mode
 In Full duplex mode, the communication is bi-directional, i.e., the
data flow in both the directions.
 Both the stations can send and receive the message simultaneously.
 Full-duplex mode has two simplex channels. One channel has traffic
moving in one direction, and another channel has traffic flowing in
the opposite direction.
 The Full-duplex mode is the fastest mode of communication
between devices.
 The most common example of the full-duplex mode is a telephone
network. When two people are communicating with each other by a
telephone line, both can talk and listen at the same time.

virajrajput1997@gmail.com
Advantage of Full-duplex mode:

 Both the stations can send and receive the data at the
same time.

Disadvantage of Full-duplex mode:

 If there is no dedicated path exists between the


devices, then the capacity of the
communication channel is divided into two
parts.

virajrajput1997@gmail.com
Introduction to Internet, WWW and Web Browsers
 Internet is a global communication system that links together
thousands of individual networks. It allows exchange of
information between two or more computers on a network. Thus
internet helps in transfer of messages through mail, chat, video &
audio conference, etc. It has become mandatory for day-to-day
activities: bills payment, online shopping and surfing, tutoring,
working, communicating with peers, etc.

 In this topic, we are going to discuss in detail about concepts like


basics of computer networks, Local Area Network (LAN), Wide
Area Network (WAN), concept of internet, basics of internet
architecture, services on internet, World Wide Web and websites,
communication on internet, internet services, preparing computer
for internet access, ISPs and examples (Broadband/Dialup/Wi-Fi),
internet access techniques.

virajrajput1997@gmail.com
What is an ISP?

 ISP is an acronym that stands for Internet Service Provider.


An Internet Service Provider is a company that provides
Internet access to organizations and home users.

In short, an ISP provides you with Internet access, usually


for a fee. Without an ISP, you wouldn’t be able to shop
online, access Facebook, or read this page. Connecting to
the Internet requires specific telecommunications,
networking, and routing equipment. ISPs allow users
access to networks that contain the required equipment,
enabling users to establish Internet connectivity.

virajrajput1997@gmail.com
Uses of Internet
 The Internet is a global networking system that can be used on
most devices nowadays and has become an essential part of our
lives. In today's technological era, most of the companies are
getting their operations done over the Internet. There are various
uses of the Internet by which companies and individuals are
making their daily tasks more productive and more comfortable.

virajrajput1997@gmail.com
What is World Wide Web?

 World Wide Web, which is also known as a Web, is a collection of


websites or web pages stored in web servers and connected to
local computers through the internet. These websites contain text
pages, digital images, audios, videos, etc. Users can access the
content of these sites from any part of the world over the internet
using their devices such as computers, laptops, cell phones, etc.
The WWW, along with internet, enables the retrieval and display
of text and media to your device.

virajrajput1997@gmail.com
Difference between World Wide Web and Internet:

 Some people use the terms 'internet' and 'World Wide Web'
interchangeably. They think they are the same thing, but it is not so.
Internet is entirely different from WWW. It is a worldwide network of
devices like computers, laptops, tablets, etc. It enables users to send
emails to other users and chat with them online. For example, when you
send an email or chatting with someone online, you are using the
internet.
 But, when you have opened a website like google.com for information,
you are using the World Wide Web; a network of servers over the
internet. You request a webpage from your computer using a browser,
and the server renders that page to your browser. Your computer is called
a client who runs a program (web browser), and asks the other computer
(server) for the information it needs.

virajrajput1997@gmail.com
What is E-mail?
 E-mail is defined as the transmission of messages on the Internet.
It is one of the most commonly used features over
communications networks that may contain text, files, images, or
other attachments. Generally, it is information that is stored on a
computer sent through a network to a specified individual or
group of individuals.
 Email messages are conveyed through email servers; it uses
multiple protocols within the TCP/IP suite. For example, SMTP is a
protocol, stands for simple mail transfer protocol and used to
send messages whereas other protocols IMAP or POP are used to
retrieve messages from a mail server. If you want to login to your
mail account, you just need to enter a valid email address,
password, and the mail servers used to send and receive
messages

virajrajput1997@gmail.com
Uses of email
 Email can be used in different ways: it can be used to communicate
either within an organization or personally, including between two
people or a large group of people. Most people get benefit from
communicating by email with colleagues or friends or individuals or
small groups. It allows you to communicate with others around the
world and send and receive images, documents, links, and other
attachments. Additionally, it offers benefit users to communicate with
the flexibility on their own schedule.
History of E-mail
 Possibly MAILBOX was used at Massachusetts Institute of Technology,
which was the first email system of this type from 1965. For sending
messages on the same computer, another early program
was SNDMSG.
 Later in 1972, Ray Tomlinson invented email to remove some
difficulties. Tomlinson worked (Like many of the Internet inventors)
for Newman and Bolt Beranek as an ARPANET contractor. To denote
sending messages from one computer to another, he picked up the @
symbol from the keyboard.
virajrajput1997@gmail.com
Advantages of Email

 Cost-effective: Email is a very cost-effective service to


communicate with others as there are several email
services available to individuals and organizations for free
of cost. Once a user is online, it does not include any
additional charge for the services.
 Email offers users the benefit of accessing email from
anywhere at any time if they have an Internet connection.
 Speed and simplicity: Email can be composed very easily
with the correct information and contacts. Also, minimum
lag time, it can be exchanged quickly.
 Mass sending: You can send a message easily to large
numbers of people through email.

virajrajput1997@gmail.com
Disadvantages of Email
 Spam: Although in recent days, the features of email have been improved,
there are still big issues with unsolicited advertising arriving and spam
through email. It can easily become overwhelming and takes time and
energy to control.
 Information Overload: As it is very easy to send email to many people at a
time, which can create information overload. In many modern workplaces, it
is a major problem where it is required to move a lot of information and
impossible to tell if an email is important. And, email needs organization and
upkeep. The bad feeling is one of the other problems with email when you
returned from vacation and found hundreds of unopened emails in your
inbox.
 Viruses: Although there are many ways to travel viruses in the devices,
email is one of the common ways to enter viruses and infect devices.
Sometimes when you get a mail, it might be the virus come with an attached
document. And, the virus can infect the system when you click on the email
and open the attached link. Furthermore, an anonymous person or a trusted
friend or contact can send infected emails.
 Insecure: There are many hackers available that want to gain your
important information, so email is a common source to seek sensitive data,
such as political, financial, documents, or personal messages. In recent
times, there have various high-profile cases occurred that shown how email
is insecure about information theft.
virajrajput1997@gmail.com
SMTP
 SMTP stands for Simple Mail Transfer Protocol.
 SMTP is a set of communication guidelines that allow software to
transmit an electronic mail over the internet is called Simple Mail
Transfer Protocol.
 It is a program used for sending messages to other computer users based
on e-mail addresses.
 It provides a mail exchange between users on the same or different
computers, and it also supports:
 It can send a single message to one or more recipients.
 Sending message can include text, voice, video or graphics.
 It can also send the messages on networks outside the internet.

virajrajput1997@gmail.com
Working of E-mail
 Email working follows the client server approach. In this
client is the mailer i.e. the mail application or mail
program and server is a device that manages emails.
 Following example will take you through the basic steps
involved in sending and receiving emails and will give you
a better understanding of working of email system:
 Suppose person A wants to send an email message to
person B.
 Person A composes the messages using a mailer program
i.e. mail client and then select Send option.
 The message is routed to Simple Mail Transfer Protocol to
person B’s mail server.
 The mail server stores the email message on disk in an
area designated for person B.
virajrajput1997@gmail.com
structure of email

virajrajput1997@gmail.com
 E-mail Header
 The first five lines of an E-mail message is called E-mail header. The header
part comprises of following fields:
 From , Date, To, Subject, CC, BCC

From
 The From field indicates the sender’s address i.e. who sent the e-mail.
Date
 The Date field indicates the date when the e-mail was sent.
To
 The To field indicates the recipient’s address i.e. to whom the e-mail is sent.
Subject
 The Subject field indicates the purpose of e-mail. It should be precise and to
the point.
CC
 CC stands for Carbon copy. It includes those recipient addresses whom we
want to keep informed but not exactly the intended recipient.
BCC
 BCC stands for Black Carbon Copy. It is used when we do not want one or
more of the recipients to know that someone else was copied on the
message.

virajrajput1997@gmail.com
What is a Computer Network?
 Computer Network is a group of computers connected with
each other through wires, optical fibres or optical links so
that various devices can interact with each other through a
network.
 The aim of the computer network is the sharing of resources
among various devices.
 In the case of computer network technology, there are
several types of networks that vary from simple to complex
level.

virajrajput1997@gmail.com
NIC(National interface card)
 NIC is a device that helps the computer to communicate with
another device. The network interface card contains the hardware
addresses, the data-link layer protocol use this address to identify
the system on the network so that it transfers the data to the correct
destination.
 There are two types of NIC: wireless NIC and wired NIC.
 Wireless NIC: All the modern laptops use the wireless NIC. In
Wireless NIC, a connection is made using the antenna that employs
the radio wave technology.
 Wired NIC: Cables use the wired NIC to transfer the data over the
medium.

Hub
 Hub is a central device that splits the network connection into
multiple devices. When computer requests for information from a
computer, it sends the request to the Hub. Hub distributes this
request to all the interconnected computers.
virajrajput1997@gmail.com
Switches
 Switch is a networking device that groups all the devices over the
network to transfer the data to another device. A switch is better than
Hub as it does not broadcast the message over the network, i.e., it sends
the message to the device for which it belongs to. Therefore, we can say
that switch sends the message directly from source to the destination.

Cables and connectors

 Cable is a transmission media that transmits the communication


signals. There are three types of cables:
 Twisted pair cable: It is a high-speed cable that transmits the data
over 1Gbps or more.
 Coaxial cable: Coaxial cable resembles like a TV installation cable. Coaxial
cable is more expensive than twisted pair cable, but it provides the high
data transmission speed.
 Fibre optic cable: Fibre optic cable is a high-speed cable that transmits
the data using light beams. It provides high data transmission speed as
compared to other cables. It is more expensive as compared to other
cables, so it is installed at the government level.
virajrajput1997@gmail.com
Router
 Router is a device that connects the LAN to
the internet. The router is mainly used to
connect the distinct networks or connect
the internet to multiple computers.
Modem
 Modem connects the computer to the
internet over the existing telephone line. A
modem is not integrated with the computer
motherboard. A modem is a separate part
on the PC slot found on the motherboard.

virajrajput1997@gmail.com
Computer Network Types
 A computer network is a group of computers linked to each other
that enables the computer to communicate with another
computer and share their resources, data, and applications.
 A computer network can be categorized by their size. A computer
network is mainly of three types:
 LAN(Local Area Network)
 MAN(Metropolitan Area Network)
 WAN(Wide Area Network)

virajrajput1997@gmail.com
LAN(Local Area Network)
 Local Area Network is a group of computers connected to each
other in a small area such as building, office.
 LAN is used for connecting two or more personal computers
through a communication medium such as twisted pair, coaxial
cable, etc.
 It is less costly as it is built with inexpensive hardware such as
hubs, network adapters, and ethernet cables.
 The data is transferred at an extremely faster rate in Local Area
Network.
 Local Area Network provides higher security.

virajrajput1997@gmail.com
MAN(Metropolitan Area Network
 A metropolitan area network is a network that covers a larger
geographic area by interconnecting a different LAN to form a
larger network.
 Government agencies use MAN to connect to the citizens and
private industries.
 In MAN, various LANs are connected to each other through a
telephone exchange line.
 The most widely used protocols in MAN are RS-232, Frame Relay,
ATM, ISDN, OC-3, ADSL, etc.
 It has a higher range than Local Area Network(LAN).

virajrajput1997@gmail.com
WAN(Wide Area Network)
 A Wide Area Network is a network that extends over a large
geographical area such as states or countries.
 A Wide Area Network is quite bigger network than the LAN.
 A Wide Area Network is not limited to a single location, but
it spans over a large geographical area through a telephone
line, fibre optic cable or satellite links.
 The internet is one of the biggest WAN in the world.
 A Wide Area Network is widely used in the field of Business,
government, and education.

virajrajput1997@gmail.com

You might also like