PDF Document
PDF Document
PDF Document
BENEFITS OF LAN
Resource Sharing
All resources are connected to one network, and if a computer needs a resource it can
be shared with another computer including DVD drives, printers, scanners, modems,
and hardware drives
The Relationship between the client and the server
All data of connected computers can be stored on one server like movies and songs
can be stored on a server and accessed by any authorized user.
Internet Sharing
It is which the Internet cable is connected to a server and distributed through the
operating system among the connected computers in the office and internet cafes.
Sharing applications and software
Applications and software can be easily shared over a LAN.
Data Security
Data storage on the server is highly secure. If you want to modify or delete data you can
easily do so on a server computer.
Easy and fast communication
Computers can exchange data and messages easily and quickly. This saves time and
gets things done faster it allows any user to share messages and data with any other
user on the network.
Computer ID
Each computer has its own MAC address, which is temporarily stored on a switch or
router when communicatory. All computers on the LAN can be identified by a MAC
address which can send and receive messages and data. On old computers, network
adapters are not built into the motherboard.
What is MAN?
A metropolitan area network (MAN) is a network with a size greater than LAN but
smaller than a WAN. It normally comprises networked interconnections within a city that
also offers a connection to the Internet.
How is MAN formed?
A Metropolitan Area Network is formed by connecting multiple LANs; thus, it covers a
larger geographical area than a LAN. A Metropolitan Area Network is more extensive
than a LAN network but smaller than a wide-area network (WAN).
• Cable TV network
• Telephone networks
• DSL line
• The IUB network
• IEEE 802.16
• WiMAX
Characteristics of MAN
• Metropolitan Area Network (MAN) is an interconnection of the local area network
(LAN).
• It is easier to interconnect between the computers.
• Its network range in size from 5 to 50 km, and it could be surrounded by a small
number of buildings to an entire city.
• It has a system for local video surveillance.
• The user generally owns a MAN, and they provide the services to multiple LAN
networks.
• It gives the facility of sharing the resources to the entire region of MAN.
• They can connect LANs to WANs and provide internet connectivity.
• The data rate of the MAN network is medium to high.
• Metropolitan Area Networks gives a high-quality voice, data, and video
transmission. This is the reason to make a MAN network that works in the city.
• It mostly covers the town and cities in a maximum range of 50 km range.
• They mostly used the medium of optical fiber cable.
• Data rates are enough for distributed computing applications
2. Point-to-point WAN
In a point-to-point WAN environment, two LANs or end nodes are connected
through a dedicated and secure leased line. Old school broadband networks
using dial-up technology are a good example of point-to-point WAN. Modern
enterprises also use this type of WAN to enable secure and customized network
performance between two locations. Each of the two end nodes is further
connected to multiple devices to create a local area network.
CONNECTION OF WAN
A wide area network (WAN) connection allows devices to connect over a wide
geographic area without utilising public internet. Without a WAN, information can
only travel within the local area network (LAN), such as in one office. For
businesses wanting to collaborate across multiple locations, a WAN is essential.
WAN Connection Types
There are many WAN connections that we use to provide our connectivity to the
internet. Below are the common options for WAN connectivity from the internet
provider.
Leased Line
This WAN connection type is a dedicated point-to-point link and fixed-
bandwidth data connection. By using leased lined, your network will have a
completely secured and reliable connection, high bandwidth, and superior
quality of service. On the other side, leased lines can be expensive and not
scalable as it is a permanent physical connection.
Cable Internet
One way to provide broadband internet connection is by using cable internet
from a local cable TV provider. It has quite a similarity with DSL as it also
uses an existing cable modem from cable TV to send data. On this
connection, the speed varies with the number of users on the service at a
specific time.
Wireless WAN
Most of us are using mobile phones that use mobile data to connect to the
internet. The commonly known connection types for wireless WAN are 3G,
4G, LTE, and 5G. It is the services offered by local ISP to provide wireless
internet access to mobile devices via cellular sites. It uses specific
frequencies to provide wider coverage and stronger signal to customers.
1. End devices
End devices are computing systems that are being connected through wide
area network technology. These can range from user-facing interfaces like
mobile devices, PCs, and industry-specific workstations to servers, data
centers, and mainframes. End devices in one location are grouped into a
LAN, and multiplier LANs are connected via WAN. The location and nature of
the end device will help you determine the type of WAN technology to use.
Access points are a staple of enterprise WAN architecture. It lets you extend
the wireless coverage of your local area network so that you can group
hundreds or thousands of end devices spread across a massive office
campus into a single LAN. Once again, access points and routers are both
considered to be CPE.
3. Network switches
Network switches (also part of your CPE) sit between your access points and
routers and the end devices to which they are connected. They forward data
packets coming through the external network and regulate how they are
distributed across your various end devices. Switches can exist in multiple
layers, and their job is to ensure that every device gets the bandwidth it
requires for optimal performance. In an SD-WAN environment, the network
switch system exists purely in software format so that you can
programmatically configure how switches are turned on/off and managed.
5. Connecting media
The connecting media carries data packets in a WAN mesh architecture to
and from different LAN components. There is a wide variety of media to
choose from when setting up your WAN, including traditional MPLS lines,
fiber optic cables, the cellular (3G, 4G, or 5G) spectrum, and satellite
connectivity. A complex enterprise WAN architecture will rely on multiple
media to connect end devices with the internet. For example, MPLS lines are
best suited to LAN environments in close proximity, 4G enables high-speed
connections in remote environments, and satellite connectivity is used for
security-sensitive applications.
Depending on the service, WANs can be used for almost any data sharing
purpose for which LANs can be used. Slower transmission speeds, however,
may make some applications less practical for WANs. The most basic uses of
WANs are for electronic mail and file transfer, but WANs can also permit
users at remote sites to access and enter data on a central site's database,
such as instantaneously updating accounting records. New types of network-
based software that facilitate productivity and production tracking, such as
groupware and work-flow automation software, can also be used over WANs.
Using groupware, workers at dispersed locations can more easily collaborate
on projects. WANs also give remote offices access to a central office's other
data communications services, including the Internet.
Advantages of WAN :
Increase efficiency
Easy of communication
Large network cover
Share information over the large area
Message can be sent very quickly to anyone else on the network
It supports the global market and global business
Centralized IT infrastructure
Boost your privacy
Disadvantages of WAN :
It is slow in speed
It is complicated and complex
It is difficult to maintain the network
It is very costly because we have to pay every time for transferring data
WAN is a big and complex problem
Very much dependent on the third party because it is a public network
WAN is not secure and means not reliable
Security problem
Training cost
Maintenance problem
Require high-performance device
To store and manage data efficiently in the database let us understand some key terms:
1. Database Schema: It is a design of the database. Or we can say that it is a skeleton
of the database that is used to represent the structure, types of data will be stored in
the rows and columns, constraints, relationships between the tables.
3. Data dictionary or Metadata: Metadata is known as the data about the data. Or we
can say that the database schema along with different types of constraints on the data
is stored by DBMS in the dictionary is known as metadata.
6. Data manipulation: In a database, we can easily manipulate data using the three
main operations that is Insertion, Deletion, and updation.
Some of the most important characteristics of the database approach to the file
processing approach are the following as follows.
Approach 1:
Self-Describing Nature of a Database System:
- One of the most fundamental characteristics of the database approach is that the
database system contains not only the database itself but also an entire definition or
description of the database structure and constraints also known as metadata of the
database.
Approach 2:
Isolation between Programs and Data, and Data Abstraction:
- In a traditional file processing system, the structure of database knowledge files is
embedded within the application programs, so any changes to the structure of a file
may require changing all programs that access that file.
Approach 3:
Support for Multiple Views of the Data:
- A database sometimes has many users, each of whom may require a special
perspective or view of the database.
Approach 4:
Sharing of knowledge and Multi-user Transaction Processing:
- A multi-user DBMS, as its name implies, must allow multiple users to access the
database at an equivalent time or concurrently.
• With the passive database management system, the user needs to specify the
query to the current state of the database system to retrieve the desired information.
• The active database management system on other hand are referred to as data-
driven systems or event-driven systems where the control flow between the application
and DBMS is based on the occurrence of an event.
♦ Data Independence
- Data independence is the ability to modify the scheme without affecting the programs
and the application to be rewritten.
There are two levels of data independence based on three levels of abstraction.
These are as follows;
• Data Definition Language (DDL) – commands are used to alter/create schema and
metadata of the database.
• Data Manipulation Language (DML) - commands are used to access and
manipulate data stored in existing schema objects.
• Data Control Language (DCL) – commands are used to control the user privileges in
the database system.
• Transaction Control Language (TCL)– commands deal with the transactions within
the database.
♦Database Users
- Database users are granted access to read, insert, update, and delete specific objects
that define a set of fields and business rules. These objects can also update one or
more database tables.
- Database users in DBMS can be categorized based on their interaction with the
databases. According to the tasks performed by the database users on the databases,
we can categorize them into seven categories as follows:
• Database Designers
- Database Designers are the type of database users in DBMS who are responsible for
implementing the overall design of the database.
• System Analysts
- System Analysts are the type of database users in DBMS who analyze the
requirements of Naive / Parametric End users. It is their responsibility to check whether
all the requirements of end users are satisfied or not.
• Sophisticated Users
- Sophisticated users have knowledge of DBMS (DDL & DML commands) and are
familiar with the database. Instead of writing whole programming code, they can interact
with the database directly using SQL queries using the query processor.