Home  >  Article  >  What are the two types of nodes?

What are the two types of nodes?

Guanhui
GuanhuiOriginal
2020-07-23 14:49:0710346browse

What are the two types of nodes?

What are the two types of nodes?

1. Wide area network can cover a range from hundreds to thousands of kilometers. It is a remote network used within an industry or professional system, not the public Internet;

2 , LAN is the most widely used network, almost every unit has a LAN.

Local Area Network

A local area network is naturally a regional network formed in a local area. Its characteristic is that the distribution area is limited, and it can be as large or as small as a building. Connections between adjacent buildings can be as small as connections between offices. Compared with other networks, the LAN itself has faster transmission speed, more stable performance, simple framework, and closed nature, which is why many organizations choose it. The local area network itself is roughly composed of three major parts: computer equipment, network connection equipment, and network transmission media. Computer equipment includes servers and workstations, and network connection equipment includes network cards, hubs, and switches. The network transmission medium is simply Network cable is composed of three major components: coaxial cable, twisted pair and optical cable.

A local area network is a private network, usually within or near a building, such as a home, office, or factory. Local area networks are widely used to connect personal computers and consumer electronic devices, allowing them to share resources and exchange information. When LANs are used in companies, they are called enterprise networks.

A local area network connects various computers, external devices and databases in a certain area to form a computer communication network, and connects to local area networks or databases in other places through dedicated data lines to form a larger information processing system. LAN connects network servers, network workstations, printers and other network interconnection devices through network transmission media to achieve system management files, share application software, office equipment, send work schedules and other communication services. The LAN is a closed network, which can prevent information leakage and external network virus attacks to a certain extent, and has high security. However, once an incident such as a hacker attack occurs, it is very likely to cause the entire LAN to be paralyzed, and all work within the network will be unable to do so. Conduct or even leak a large number of company secrets, causing serious damage to the company's business development. In 2017, the country promulgated the "Cybersecurity Law of the People's Republic of China", which officially came into effect on June 1. It clearly stipulates network security and information security from a legal perspective, and puts forward corresponding requirements for network operators and users. Improve the security of network use.

Wide Area Network

When the distance exceeds the distance connected by the hub in an area, it must be connected through a router. This type of network is called a wide area network. If there are northern, central, southern and other branches, or even overseas branches, connecting these branches through dedicated lines is called a "wide area network".

The transmission medium of WAN mainly uses telephone lines or optical fibers, and ISP operators connect enterprises. These lines are pre-buried under the road by ISP operators. Because the project is huge, maintenance is difficult, and the bandwidth is It can be guaranteed, so it will be more expensive in terms of cost.

The Internet generally refers to a public wide area network. The cost of a public wide area network will be lower and it is a cheaper online environment. However, compared with a wide area network, it cannot be managed. Bandwidth, using a public online system, the bandwidth of any section cannot be guaranteed.

Recommended tutorial: "PHP"

The above is the detailed content of What are the two types of nodes?. For more information, please follow other related articles on the PHP Chinese website!

Statement:
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn