Geographical Types of Network 1. Personal Area Network (PAN)
Geographical Types of Network 1. Personal Area Network (PAN)
Geographical Types of Network 1. Personal Area Network (PAN)
Sadsad
BSIT 2-2
The smallest and most basic type of network. It is made up of a wireless modem, a computer or two,
phones, printers, tablets, etc., and revolves around one person in one building. Typically found in small
offices or residences, and are managed by one person or organization from a single device.
The most frequently discussed networks, one of the most common, one of the most original and one of
the simplest types of networks. LANsc onnect groups of computers and low-voltage devices together
ancross short distances (within a building or between a group of two or three buildings in close proximity
to each other) to share information and resources. Enterprises typically manage and maintain LANs.
WLANs make use of wireless network technology, such as WiFi. Typically seen in the same types of
applications as LANs, these types of networks don’t require that devices rely on physical cables to
connect to the network.
Larger than LANs, but smaller than metropolitan area networks (MANs, explained below), these types of
networks are typically seen in universities, large K-12 school districts or small businesses. They can be
spread across several buildings that are fairly close to each other so users can share resources.
These types of networks are larger than LANs but smaller than WANs – and incorporate elements from
both types of networks. MANs span an entire geographic area (typically a town or city, but sometimes a
campus). Ownership and maintenance is handled by either a single person or company (a local council, a
large company, etc.).
Slightly more complex than a LAN, a WAN connects computers together across longer physical distances.
This allows computers and low-voltage devices to be remotely connected to each other over one large
network to communicate even when they’re miles apart.
This term is fairly new within the past two decades. It is used to explain a relatively local network that is
designed to provide high-speed connection in server-to-server applications (cluster environments),
storage area networks (called “SANs” as well) and processor-to-processor applications. The computers
connected on a SAN operate as a single system at very high speeds.
As an alternative to traditional switch-based Ethernet LANs, POLAN technology can be integrated into
structured cabling to overcome concerns about supporting traditional Ethernet protocols and network
applications such as PoE (Power over Ethernet). A point-to-multipoint LAN architecture, POLAN uses
optical splitters to split an optical signal from one strand of singlemode optical fiber into multiple signals
to serve users and devices.
These types of networks are built and owned by businesses that want to securely connect its various
locations to share computer resources.
By extending a private network across the Internet, a VPN lets its users send and receive data as if their
devices were connected to the private network – even if they’re not. Through a virtual point-to-point
connection, users can access a private network remotely.
This is the topmost layer in the seven OSI Layers. This is the layer that the end-user (can be a computer
programmer, or a regular PC user) is actually interacting with. This layer allows access to network
resources.
6. Presentation Layer
This is the layer in which the operating system operates with the data. Main functions of this layers
includes translation, encryption and compression of data. Basically User interacts with Application layer,
which sends the data down to Presentation layer.
5. Session Layer
This layer has the job of maintaining proper communication by establishing, managing and terminating
sessions between two computers. For example, whenever we visit any website, our computer has to
create a session with the web server of that website.
4. Transport Layer
This layer has a very important job. It decides how much information should be sent at a time. So, when
you are communicating with a website, this layer will decide how much data you can transfer and receive
at a given point of time. Also, this layer provides reliable process to process message delivery and error
recovery.
3. Network Layer
The main job of this layer is to move packets from source to destination and provide inter-networking.
This is the layer that the routers operate on. Since routers operate at the network level, hence we can
say that the IP address is at the network level.
This layer is responsible for organising bits into frames and ensuring hop to hop delivery. This is the layer
on which the Switches operate on. Since routers operate at the network level, hence we can say that the
MAC address resides at the data link layer. All the computers in a specific network get plugged inito a
switch so that they can communicate with each other.
1. Physical Layer
This is the layer on which the real transmission of data bits takes place through a medium. This layer is,
as the name suggests, all the physical stuff that connects the computers together.
TYPES OF LAN CONNECTION
Topology
Protocols
The rules and encoding specifications for sending data. The protocols also determine whether the
networks uses a peer-to-peer or client/server architecture.
Media
Divices can be connected to a twisted-pair wire, coaxial cable pr fiber optic cables. Some networks do
without connecting media altogether,connecting instead via radio waves.
Ethernet
Lan enables the user to transmit data at the rate of more than 10 mbps. In this network the system
checks for a medium before transferring data. If the medium is available, the system transmits the
information.
Token Ring
Passes a control frame called as "Token" over the network. The systems in token ring are connected in a
ring and the token also passed into ring format. The systems which wants to transmit data catches the
token attaches a data to it and then its travels around the network.
Token Bus
Uses token passing mechanism such as token ring. In token bus, the systems are physically connected in
a bus format but the token is passed in a logic ring format.
Uses token passing technique like token ring network. It uses primary and secondary rings. The actual
data transfer is done through the primarily ring whereas the secondary ring is used as backup.
This type of ADC converter comparison voltage is generated by using an integrator circuit which is
formed by a resistor, capacitor and operational amplifier combination. By the set value of Vref, this
integrator generates a sawtooth waveform on its output from zero to the value Vref. When the integrator
waveform is started correspondingly counter starts counting from 0 to 2^n-1 where n is the number of
bits of ADC. When the input voltage Vin equal to the voltage of the waveform, then control circuit
captures the counter value which is the digital value of corresponding analog input value. This Dual slope
ADC is relatively medium cost and slow speed device.
This flash analog to digital converter circuit consists of a series of comparators where each one compares
the input signal with a unique reference voltage.At each comparator, the output will be high state when
the analog input voltage exceeds the reference voltage. This output is further given to priority encoder
for generating binary code based on higher order input activity by ignoring other active inputs. This flash
type is a high-cost and high-speed device.
The SAR ADC a most modern ADC IC and much faster than dual slope and flash ADCs since it uses a
digital logic that converges the analog input voltage to the closest value. This circuit consists of a
comparator, output latches, successive approximation register (SAR) and D/A converter.