6 Oct 2022

90

Different Types of Networks and Their Applications

Format: APA

Academic level: College

Paper type: Research Paper

Words: 1669

Pages: 5

Downloads: 0

Introduction 

Networking is as well-known as computer networking. It can be described as the act of transferring and exchange of information among different nodes through a shared medium in a given channel. Networking is a process that is comprised of more than one computer system which are connected together with other electronic devices such as printers and CDSs. Technically, a network comprises of several computer systems by a physical and wireless connection. These systems range from a PC sharing out to necessary peripherals to massive data centers globally and finally to the internet itself ( Akan, Nakano, & Moore, 2010) . Nevertheless, all networks allow computers and people to share information and resources. Besides, networking is made up of not only the construction, design, and actual network use, but also it comprises of maintenance, operation and management of the network infrastructure, policies, and software. 

Wireless LAN 

Description 

Wireless LAN can be referred to as a series of network that is wireless and is linked to more than one devices using a communication that is wireless and forms a Local Area Network in computing. Most common WLANs today, are based on IEE 802.11 standards and commonly known as Wi-Fi ( Akan, Nakano, & Moore, 2010) . WLANs are popular today in schools, workplaces, and homes due to their ease of installation and use. Primarily, IEEE 802.11 contains two operational modes that are known as infrastructure mode and ad hoc mode. Staring with ad hoc mode, the mobile devices that are involved in the process are capable of transmitting peer-to-peer data. On the other hand, mobile infrastructure units are known for communicating through access points, which act as bridges to other networking systems such as the LAN and the internet (Wide Area Network). 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Uses and Benefits 

Retrieving Remote Information: Computer networks have made it possible for its users to retrieve remote information on a variety of different fields. The data retrieved is then stored in remote databases where the users can gain access through information like the (www) or the World Wide Web. 

Quick Interpersonal Communication: Networks that involves computers have increased the speed and volume of communication that was not possible before ( Fossum, & Trivedi, 2013) . For example, electronic mail (E-mail) is widely applied when sending texts, videos, documents and images across the world. Furthermore, social networks have improved the ease of receiving and sending messages around the globe. 

Information and Resource Sharing: Computer networking has enabled organization to share information across the departments in the organization effectively. This ease of transfer is made possible by programs and software. Therefore anyone with can access all the company's information from a single computer provided these computers are linked. Computer networking also allows the sharing of hardware equipment such as printers and scanners. 

Cost-Effective: Computer networks have tremendously reduced the cost of establishing computer systems in an organization. Before, it was prudent that companies set up expensive mainframe for computing and storage. However, with the coming of networks, it is possible to set up interconnected personal computers (PCs) for the same functions. 

VoIP: Voice over Internet Protocol has revolutionized telecommunication systems as we know it. Through VoIP telephone calls are made digitally by use of internet protocols instead of the traditional analog phone lines. 

E-Commerce: Computer networks have played a significant and essential goal for various businesses and commercial transactions. Users/ organizations can together pool funds, sell or buy items, manage bank accounts, pay bills or taxes, and take care of investments online. 

There are two kinds of networking using computers, these are wireless networking and wired networking. Extensive networking needs utilization of physical mediums of transfer between the nodes involved. For example, Ethernet cables made from copper are popular in wired networking because they are cheap and durable. Additionally, optical fiber transfers data over long distances and faster speeds, but relatively expensive and more fragile compared to Ethernet cables. On the other hand, wireless networking uses waves of radio to transfer data thereby facilitating computers to connect to a network as well as each other with no form of cabling present. 

Wireless Sensor Networks 

Description 

When it comes to Wireless sensor networks (WSNs), they are an example of a wireless network used for measuring conditions like temperatures, pollution levels, humidity, wind, and sound. WSN is a group of spatially dispersed sensors that are dedicated and programmed for monitoring and recording the natural surroundings of the environment. This feature makes it possible for WSN to eventually organize the gathered data to a primary point ( Ou, 2018) . WSN substantially, are spatially dispersed autonomous sensors equipped with the power of monitoring environmental conditions (sound, pressure, and temperature) and entirely relies on wireless networking to pass their data to the primary centralized location. Military applications motivated WSN's discovery, however, are currently applied in many consumer-based applications as well as industrial-based applications. WSN is made up of nodes that are ranging from hundreds to thousands where each of them is connected to one or more sensors. These network nodes are made up of micro-controllers, electronic circuits and a radio transceiver that is connected to an antenna. All the three gadgets are then connected with sensors as well as the energy source (a battery). However, the Sensor nodes vary in sizes from the size of a plate to the size of a grain. WSNs have several applications; 

Uses and Benefits 

Health Care Monitoring: These kinds of sensor networks are implanted or wearable. Embedded sensors are inserted in the body of a living organism, whereas the wearable is put over the body surface at proximity to the affected person. Environment embedded sensors are sensors placed in the background. Possible applications in humans, WSN is used to identify a person's location and generally to continually monitor an individual's health status. 

Forest Fire Detection: when it comes to these kinds of situations, network of sensors are put in place for detecting fires in forests. These sensors are critically made with the ability of measuring temperatures, gases produced during fires, and humidity. Naturally, early detection of these wildfires enables natural and early prevention of these wildfires in the forests. 

Earth Sensing: These sensors are known for facilitating the study of essential processes as well as the practical growth of hazard response systems. The sensors can be Large Scale Single Function Networks or Localized Multifunctional Sensor Networks- equipped with the power of monitoring even small areas in a detailed manner. 

Wireless ad hoc Networks 

Description 

Also known as WANET or mobile ad hoc network (MANET) refers to a network system that is decentralized and with wireless network. This kind of network does not depend on pre-existing infrastructures such as access points in wireless networks or routers in wired networks. In other words, WANET's nodes are made in such a way that each node forwards data to the others, following a determination of the node that will forward data while entirely depending on the strength of network connectivity as well as the algorithm used. When it comes to windows OS, ad hoc is used as a communication command that permits the PCs to connect directly with other PCs without the need for a router. On the other hand, Ad hoc lacks infrastructural complexities of setup and administration ( Qian, Zhang, & Deng, 2017) . Consequentially enabling computers to create and join networks anywhere and anytime. Therefore, every gadget is allowed to move independently in the direction they wish and can frequently change its links to other devices. 

Uses and Benefits of WANET/MANET 

The fact that ad hoc networks are decentralized gives them a suitable that is used in various sections of the human life. Most importantly, ad hoc networks are suitable where central nodes cannot be depended on. 

Vehicular ad hoc networks (VANETs): Are used for communication between roadside facilities and vehicles. VANETs have facilitated a reduction in road accidents in a car that uses radio waves to communicate with each other while on the road. 

Smartphone ad hoc networks (SPANs): In smartphones, SPANs support multi-hop relays. Therefore peers can join and exit the system without destroying it. Contrary to the hub and spoke networks such as Wi-Fi Direct, Apple's 8.4 iOS, has enabled multi-peer ad hoc networking, which facilitates millions of smartphones to start ad hoc networks without relying on cellular communications. 

Army tactical MANETs and air force UAV ad hoc networks: Military MANETs are used by the army to have real-time, for faster re-routing during movements, for data security, for extensive range radio and overall integration with other existing systems. Examples are the US Army's JTRS SRW, which is useful in places with no network infrastructure. On the other hand, air force ad hoc networks are used in (UAVs) Unmanned Aerial Vehicles to carry out military operations such as photography and bombings. 

Network Security 

Network security is very essential when it comes to the people who use internet and the ones who store their information in the cloud. The section is comprised of different policies that are meant to protect the interests and privacy of the users. This networking security is crucial when it comes to the monitoring and prevention process of malicious activities. These activities include cyber-crimes, unauthorized access and misuse of network. Any institution that depends on network is ready to implement network security. 

VANET 

VANET or V2V is a composition of MANET which comprises of Mobile ad hoc network. However, unlike the others, the emphasis when it comes to VANET is always on the node which serves as the main thing of consideration. Following an article that was published in the year 2001, it was confirmed that ad hoc networks are capable of being formed by motorists where they can now help in overcoming blind sports hence avoiding accidents. 

Software-Defined Networks (SDN) 

Description 

SDN refers to architecture that its primary purpose is making networks flexible. Therefore, the primary aim of SDN is improving the control of systems through facilitating quick response by service providers and users to the rapid changes in business today ( Zanjireh, & Larijani, 2015) . SDN enables an administrator to centrally change traffic in the network without affecting individual switches in the switches in the system. Initially, SDN mainly focuses on the separation of the network control plane from the data plane. However, today, it is used in several technologies, including network virtualization and automation through programs. There are several advantages of SDN, these are: 

Uses and Benefits 

The main user or creator can change the switch regulations of any network when needed by the use of SDN ( Wang, Yang, & Hu, 2011) . Therefore, an administrator can prioritize, block, or deprioritize specific packets using a specific granular level of security and control. In other words, SDN aids in cloud-computing hence helping the creator to control and manage loads of traffic effectively. Secondly, SDN helps the administrator in distributing policies that are directly connected to the switches, instead of configuring several sole gudgets. Also, SDN virtualizes hardware and services that initially were taken care of by dedicated hardware, which results in a reduced operational cost as well as hardware footprints. 

SDNs help in automating app updates like automating IT infrastructure using DevOps. Also, in campus networks, which most of the time are challenging to manage due to extensive use of Wi-Fi, whereby SDN offers a centralized control center. 

References 

Akan, O. B., Nakano, T., & Moore, M. (2010). Special Issue on Fundamentals of Nanoscale Communications.  Nano Communication Networks 1 (3), 157-159. doi:10.1016/j.nancom.2010.11.001 

Fossum, J. G., & Trivedi, V. P. (2013). Fundamentals of Ultra-Thin-Body MOSFETs and FinFETs. doi:10.1017/cbo9781139343466 

Ou, J. (2018). Energy technology revolution and China’s air pollution governance.  IOP Conference Series: Earth and Environmental Science 186 , 012009. doi:10.1088/1755-1315/186/4/012009 

Qian, H., Zhang, Q., & Deng, Y. (2017). Design of PH sensor signal acquisition and display system.  IOP Conference Series: Earth and Environmental Science 69 , 012082. doi:10.1088/1755-1315/69/1/012082 

Wang, T., Yang, Z., & Hu, H. (2011). An Event Driven Clustering Algorithm Based on Spatial Correlation in Wireless Sensor Networks.  Journal of Electronics & Information Technology 30 (3), 699-702. doi:10.3724/sp.j.1146.2007.00120 

Zanjireh, M. M., & Larijani, H. (2015). A Survey on Centralised and Distributed Clustering Routing Algorithms for WSNs.  2015 IEEE 81st Vehicular Technology Conference (VTC Spring) . doi:10.1109/vtcspring.2015.7145650 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). Different Types of Networks and Their Applications.
https://studybounty.com/different-types-of-networks-and-their-applications-research-paper

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Security Implication of the Internet of Things

The Internet of Things (IoT) can be described as s system of interconnected devices that have the ability to transfer information over a computer network without the need of human-to-computer or human-to-human...

Words: 892

Pages: 3

Views: 96

Modern Day Attacks Against Firewalls and VPNs

Introduction The need to have an enhanced security of the computer connectivity happens to be one of the reasons that attract companies and organizations towards wide usage of VPNs. Several simple techniques...

Words: 2025

Pages: 7

Views: 134

How to Deploy and Administer Windows Server 2012

Securing a reliable, and expandable configuration for a company is important to build a strong network. The new and enhanced features of the Windows Server 2012 can be used to implement the network. In this...

Words: 1673

Pages: 6

Views: 87

Deployment Model in Cloud Computing

Deployment model is a representation of a cloud environment primarily distinguished by parameters such as accessibility, proprietorship, and storage size. The National Institute of Standards and Technology gives the...

Words: 254

Pages: 1

Views: 82

How to Use Web Search Engines for Business Research

The advancement of technology has made it possible for many people around the world to have easy access to information whenever they want. The development of the Wide World Web-enabled different kinds of information...

Words: 773

Pages: 3

Views: 86

Distributed Database Management System (DDBMS)

Introduction Data management has been a headache to many technology enthusiasts for quite a long period of time. They have successfully managed to logically collect interrelated data and share it. If the data is...

Words: 799

Pages: 3

Views: 127

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration