A wide area network (WAN) is a network that covers a broad area (i.e., any telecommunication network that links across metropolitan, regional, or national boundaries) using private or public network transports. Business and government entities utilize WANs to relay data among employees, clients, buyers, and suppliers from various geographical locations. In essence, this mode of telecommunication allows a business to effectively carry out its daily function regardless of location. The Internet can be considered a WAN as well, and is used by businesses, governments, organizations, and individuals.
A PAN(Personal Area Network) is a network of Communicating devices (Computer, Phone, MP3/MP4 Player, Camera etc.) in the proximity of an individual. It can cover an area of a few meters radius.When you have to transfer songs from one cell phone to another, you set up a PAN of two phones. When files are transferred from a PC to an MP3 player, a PAN is set up between the two. There can also be multiple devices in PAN. A PAN can be set up using guided media (USB cable) or unguided media (Bluetooth, Infrared).
VOIP
Voice over Internet Protocol (VoIP) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Early providers of voice over IP services offered business models and technical solutions that mirrored the architecture of the legacy telephone network. Second-generation providers, such as Skype have built closed networks for private user bases, offering the benefit of free calls and convenience while potentially charging for access to other communication networks.
Cyber Security
Cyber security is information security applied to computers and computer network. The field covers all the processes and mechanisms by which computer-based equipment, information and services are protected from unintended or unauthorized access, change or destruction. Cyber security also includes protection from unplanned events and natural disasters.
Need: Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store confidential information on computers and transmit that data across networks to other computers. With the growing volume and sophistication of cyber-attacks, ongoing attention is required to protect sensitive business and personal information, as well as safeguard national security. So to secure all crucial and confidential data cyber security is required.Objectives Cyber Security’s main purpose is to secure the data and maintain confidentiality of any information stored in computer. It is use to secures the network, as well as protect and oversee operations being done.
Social Networking Practices
To practice safely on Social networking sites few things are important to keep in mind, such as:-
1. Never open random link or any link sends by unknown person.
2. Never trust any messages on your social network website or e-mail.
3. Always keep your personal information secure by private settings.
4. Try to avoid uploading any private information, picture or video.
5. Change use password after an interval.
6. Avoid opening your social network website or email id on unknown system.
New emerging trends
Mobile Computing
Mobile computing is human–computer interaction by which a computer is expected to be transported during normal usage. Mobile computing involves mobile communication, mobile hardware, and mobile software. Communication issues include ad hoc and infrastructure networks as well as communication properties, protocols, data formats and concrete technologies. Hardware includes mobile devices or device components. Mobile software deals with the characteristics and requirements of mobile applications.
Cloud Computing
Cloud computing enables companies to consume compute resources as a utility just like electricity --rather than having to build and maintain computing infrastructures in-house.
Cloud computing promises several attractive benefits for businesses and end users including:
• Self-service provisioning: End users can spin up computing resources for almost any type of workload on-demand.
• Elasticity: Companies can scale up as computing needs increase and then scale down again as demands decrease.
• Pay per use: Computing resources are measured at a granular level, allowing users to pay only for the resources and workloads they use.
Cloud computing services can be private, public or hybrid.