Networking: LAN vs WAN

Posted on 2011-05-09
Last Modified: 2012-05-11
I have a basic question about networking.

What is the difference between LAN vs WAN in terms of usage?

I have a server/client application which connect through TCP. I have tried it between computers connected in the same LAN and was able to connect with each other using the computer name / ip address.

Will the same application work if the computers are connected through WAN?
Question by:Thomasian
    LVL 24

    Accepted Solution

    please check the difference in below url , you will get answer for your questions
    LVL 22

    Author Comment

    Thanks for the link.

    According to my client, the computers are connected through WAN and they "see" each other. Can I assume that it will work like they are connected through LAN but with a lower transfer rate?
    LVL 5

    Assisted Solution

    You can read more about the difference here:

    The application would have to depend on the connection setting, firewall rules and router settings. How both networks connect and the permission allowed.
    LVL 5

    Expert Comment


    You can ask your client to do a simple ping test to check connectivity and telnet to the application port number to check for firewall rules.
    LVL 22

    Author Comment

    I see, so does that mean that if the ping test works and the port is not blocked, then the application would work just like they are connected through LAN?
    LVL 4

    Assisted Solution

    Thomasian: the answer is... maybe. The comments here are accurate - the answer will depend on what ports the application uses and handling of those ports by the router/switches/firewalls et. al network devices involved. A common solution would be to use a VPN - you have all the same questions (plus a few more) but you control more of the variables. (e.g. it's possible an application relies on ports allowed internally but not permitted by your Internet Service Providers).

    Per the links provided - there are many considerations specific to each piece involved. (the application, operating system, network topology, name handling, privileges etc. etc. etc.) Is it feasible to try it and see what happens?! Is a VPN a possibility?

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Enabling OSINT in Activity Based Intelligence

    Activity based intelligence (ABI) requires access to all available sources of data. Recorded Future allows analysts to observe structured data on the open, deep, and dark web.

    Greetings, Experts! First let me state that this website is top notch. I thoroughly enjoy the community that is shared here; those seeking help and those willing to sacrifice their time to help. It is fantastic. I am writing this article at th…
    Preface There are many applications where some computing systems need have their system clocks running synchronized within a small margin and eventually need to be in sync with the global time. There are different solutions for this, i.e. the W3…
    Migrating to Microsoft Office 365 is becoming increasingly popular for organizations both large and small. If you have made the leap to Microsoft’s cloud platform, you know that you will need to create a corporate email signature for your Office 365…
    Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

    737 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    18 Experts available now in Live!

    Get 1:1 Help Now