Types of Network
Types of Network
WK 4 CLA 1
Prahar Neupane
Westcliff University
Abstract
Information technology (IT) is defined as the use of computer and internet to store or
retrieve any data or information. We use Information technology to achieve the goals of the
Information systems. Information system is designed to collect data, process the collected data,
and deliver timely, relevant, and useful information that can be used for making decisions in any
these organizational levels, we have got to learn about these following six concepts:
Keywords: Networks, Wireless technologies, mobile networks, intranets, extranets, web trends,
Contents
Topics Page
7. Conclusion 16
8. Reference 17-18
P age |4
1.1 Local Area Network (LAN): Local Area Network is a computer network that connects
computers in a close proximity. It can cover a limited area like, a building, a campus, or a
company. It is owned by a single party. It’s speed ranges from 100 Mbps to 10 Gbps. In
LAN Coaxial cables and phone lines are basically used to convey network signals. (Jawahar
Babu, K.V.S.N., & Munikumar, S., 2012). The normal Wi-Fi of our home is the basic
example of LAN.
1.2 Wide Area Network (WAN): Wide Area Network is a computer network that connects
computers in a wide area span like, several cities, states and countries. It is owned by more
than one party. It’s speed ranges from 28.8 Kbps to 155 Mbps. This network is basically
used in the business entities by the international brands regardless of the international
borders. (Jawahar Babu, K.V.S.N., & Munikumar, S., 2012). This fully relies upon wireless
transmission of signals.
1.3 Metropolitan Area Network (MAN): Metropolitan Area Network is a computer network
designed to connect computers within a metropolitan area and handle data communications
for multiple organizations in a specific city or a nearby city. It is owned by one to several
parties. It’s speed ranges from 34 Mbps to 155 Mbps. This type of network uses fiber-
optical cables. This is basically used by government for the public purpose in a specific
sector helps to access the internet. For example: LAN provides a network access to a office in a
building. One can easily access install this type of Network and it is very fast in comparison to
P age |5
other types of networks. Intranet is also a type of LAN. Moreover, a connection between some
expensive devices like printer with all the computers is also an example of LAN. To talk about
example of the WAN, 3G or 4G network is a very applicable example. The example of MAN
Wireless technology refers to the technology that runs under wireless network. A wireless
network operates without wire instead of traditional wired connection. On the other hand, Mobile
technology uses mobile network that operates on a radio frequency (RF). It consists of radio cells
communicate with the radio towers in the nearest area. Satellites in the orbit of Earth near the
WLAN is the upgraded and alternative version of wired LAN. It is operated by a single
owner and is capable of covering a small limited area. For example: Wi-Fi in our home.
WWAN is a bigger form of WLAN. It covers a broader area than WLAN. WWAN
includes the devices like Cellular digital packet data (CDPD), paging networks, personal
communication system (PCS), satellite networks, microwave networks, packet radio networks,
Wireless technologies provide a huge advantage like mobility, flexibility, and easy installation.
These wireless technologies and mobile technologies can help a lot in business setting. For
example, A company in UK named Jocial is a affiliated marketing company which offers money
to its users to post about different items. So, a user from Nepal can also participate and work in
Intranets refers to a private network that enables staffs and employees in an enterprise to
securely share knowledge and information easily within an organization. The information
available on the company’s intranet is unavailable to public. (D. Piraino, 1997) Intranet provides
fast and easy access to information and different programs within the organization while
maintaining integrity of the information and secure access to the information (D. Piraino, 1997).
Extranets refers to a private network that uses internet technology and public
system with partners, customers, suppliers or other businesses. (D. Piraino, 1997). In other
words, extranet is an extended intranet that is extended to authorized users even outside of the
signatures, digital certificates and compression techniques allows intranet to expand to public
So, basically Intranets are the secured network within an organization whereas the
extranet is the larger intranet which provides the secure connection between intranets of the
The Intranets and Extranets have got some similarities too. They consist of the same
basic three components: Computer network, Client software, and Server software.
An example of Intranet network is the connection inside a bank. The bank consists of
many confidential data and which may get leaked and billions of money might get stolen if the
public internet is used. So, they have their own network called intranet which has a firewall and
P age |9
restricts the unauthorized user. Only the officers of that bank can access the information which
Likewise, extranet is the extended intranet. For example; It creates secure network
between one branch of bank to another branch or also sometimes with other partner banks. It has
a bit more authorization for a greater number of users and also some customers who uses the
Web trends are the evolution of web development in the World wide web. There are three
generations of web evolution i.e., Web 1.0, Web 2.0, and Web 3.0. Web 1.0 is a traditional web
application and are static pages. They are written in HTML. It can only be viewed by the users,
so it is one way only. Web 2.0 is a more interactive and collaborative trend than Web 1.0. It is
also called participative social web. It uses AJAX and JavaScript frameworks. It contains the
social media dialogue where user can communicate with the producers. Web 3.0 is a Semantic
Web. It refers to the evolution of web utilization and interaction including altering the web into
database [7]. It is based on Artificial Intelligence and uses ontological language like OWL to
produce domain- specific ontologies that machines can use to make the conclusion about
information [7].
Web 2.0 is the current web trend. But we are slowly moving to the Web 3.0. Web 3.0 is
based on the Artificial Intelligence so, business organization can benefit from that. For example,
Google assistant is a Web 3.0 and now a days google search engine is also a Web 3.0. User can
search for Apple in the search engine, based upon AI and past search history, a technological
person may get results of Apple company at the first priority whereas a normal person or a
computer hardware. In the 21st century, Information Technology is the top most industry. No
any sector is untouched by this industry. IT has taken everything upon itself because IT has made
field. Ethics refers to the moral principle and cannot be set as a law because it may vary from a
condition to another condition. So, there are some of the ethical implementations in IT sector
like;
• Always think about the social consequences of the programs and software which you
make.
common organization like any school or university always buys an original licensed software
commerce is built on traditional commerce by adding the flexibility of network and availability
of internet. Nowadays, buying and selling of products has become much easier due to e-
commerce as a customer doesn’t need to go to the marts, rather they order the products and it
Categories of E-commerce:
There are three major bases upon which nine categories of e-commerce are formed.
Consumer, Business and Government are the major bases. The nine major categories based on
them are:
In this category, the products are directly sold to the consumers. Amazon, daraz, etc. are
its examples. It is very convenient to the public and is growing very quickly.
In this category, electronic transaction takes place between two businesses. It is one of
the fastest growing categories as this makes business between two companies far from each
other, possible. Example: Walmart makes this possible for e-commerce between Johnson &
Johnson and Procter & Gamble. It includes Electronic Data Interchange (EDI) and Electronic
In this category, the products are directly sold from a consumer to another consumer
through internet. This involves mainly the second-hand products. eBay, OLX, etc. are some of
This category involves people selling products to the businesses. This involves online
surveys and crowdsourcing the information to their website for a certain price.
Department of defense, internal and revenue service and department of Treasury mainly uses e-
commerce.
In this category, governmental services like downloading of Tax payment forms, voter
registration forms or any other forms which are required to download by the citizens is there.
This category involves sales of federal assets and license application and renewals of
companies.
This category involves the diplomatic relation between two countries. Example: Helping
This category involves the e-commerce between government and the employee. E-
7. Conclusion
To conclude, with these 6 concepts we can ultimately manage and implement IT solution
in any IT business companies. The three types of networks provide the base for the internet and
network communication. The LAN, MAN and WAN are the types of networks which we learnt.
Likewise, the wireless and mobile technologies are implemented in business setting as
businessman can easily use wireless internet connection to buy communicate with different
business clients by virtual medium from another place. Moreover, Intranets and Extranets are
detailly explained. It is essential to create a secure network within some sensitive organizations
like bank. Then, we talked about web trends and the evolution from Web 1.0 to Web 3.0.
8. References
Networks. International Journal of Social Science & Interdisciplinary Research, 1(11), 159-
http://indianresearchjournals.com/pdf/IJSSIR/2012/November/17.pdf
2. Setiawan, H., & Firdaus. (2013). The most possible scheme of joint service detection for the
https://www.proquest.com/scholarly-journals/most-possible-scheme-joint-service-
detection-next/docview/1459331770/se-2?accountid=158986
3. Piraino, D. (1997). The use of intranets and extranets in radiology. Journal of digital
https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3452851/pdf/10278_2009_Article_BF03168
647.pdf
4. Ravinder Talwar (2019). Information Technology and Ethical Issues. International Journal of
5. MIS 8th Edition by Hossein Bidgoli, Data Communication: Delivering Information Anywhere
and Anytime
6. MIS 8th Edition by Hossein Bidgoli, The Internet, Intranets, and Extranets
P a g e | 18
6. France, S. L., Shi, Y., & Kazandjian, B. (2020). Web Trends: A valuable tool for business
https://www.researchgate.net/profile/Stephen-
France/publication/346479209_Web_Trends_A_valuable_tool_for_business_research/links/5
fc6eaa145851568d132333f/Web-Trends-A-valuable-tool-for-business-research.pdf
7. Web 1.0, Web 2.0 and Web 3.0 with their difference. GeeksforGeeks (2018)
https://www.geeksforgeeks.org/web-1-0-web-2-0-and-web-3-0-with-their-difference/
8. Jetton, K. (2013). E-Commerce. Counterpoints, 391, 221-232. Retrieved May 31, 2021, from
http://www.jstor.org/stable/42981448