Businesses depend on communication networks to transmit information; each uses a system of symbols, writing, signals, or speech to share information, communicating via tools such as phones and computers. 

 

1

 

Each network has specific purposes and uses such as running voice, videoconferencing, email, and other UCC tools, along with file transfers and critical business transactions. Networks are required to enable organizations to reduce overall capital expenditures and improve their agility.

 

Local Area Network (LAN) – A local area network is a network of computers in a localized area, such as in an office or on a campus. All the computers are connected to each other through the LAN via a hub or a switch. The larger the number of computers on the LAN, the slower the LAN runs.

2

Wide-Area Network (WAN) – A wide-area network covers a large geographic area and typically consists of multiple computer networks. The Internet is a type of WAN that relies on a large global network of service providers that use routers, switches, modems, and servers to provide connectivity to workers and organizations around the globe. It is a network of interconnected computers that carries data, media, and webpages.

 

3

Wireless Networks – Wireless networks provide transmission and network connectivity to devices without cables or wires. Wi-Fi is a wireless network for computers that have remote access to the network. Bluetooth, which connects with a nearby mobile phone, is a shorter-range version of a wireless network and supports transmission of voice and data, but only at a distance of a few feet from the communication device that it works with.

 

mobile_smartphone_wireless_iot_virtual-network-100751593-large

Virtual Private Network (VPN) – A virtual private network (VPN) is a network that is constructed using public wires — usually the Internet — to connect remote users or regional offices to a company’s private, internal network. A VPN secures the private network, using encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted. 

5