Module 2 IT
Module 2 IT
1. Local Area Network (LAN): A LAN connects devices within a limited area, such as a home,
school, or office. It is typically faster and more secure than other types of networks, making it
ideal for small-scale environments.
2. Wide Area Network (WAN): A WAN spans large geographical areas, connecting multiple
LANs. The internet is the largest example of a WAN, enabling global communication and data
exchange.
3. Virtual Private Network (VPN): A VPN provides a secure connection over public networks,
encrypting data to ensure privacy. It is commonly used for remote work and secure internet
browsing.
1. Routers: Devices that connect different networks, directing data packets to their destination.
They enable communication between LANs and WANs.
2. Switches: Devices that connect multiple devices within a LAN, ensuring data is sent only to
the intended recipient.
3. Protocols: Rules that govern how data is transmitted over networks. The most important
protocol suite is TCP/IP (Transmission Control Protocol/Internet Protocol), which ensures
reliable communication by breaking data into packets and reassembling them at the
destination.
1. Firewalls: Firewalls act as a barrier between a trusted internal network and untrusted
external networks. They monitor and control incoming and outgoing traffic based on
predefined security rules, protecting against unauthorized access. Firewalls can be hardware-
based, software-based, or a combination of both.
2. Encryption: Encryption secures data by converting it into an unreadable format, which can
only be accessed with a decryption key. Common encryption techniques include symmetric
encryption (using the same key for encryption and decryption) and asymmetric encryption
(using a public and private key pair). Encryption is widely used in secure communications,
online transactions, and data storage.