StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

WAN Technology - Research Paper Example

Cite this document
Summary
A public WAN would cost the company lower to install and maintain but would also entail lower reliability and security during use. In contrast, a private WAN would cost the company more to…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.3% of users find it useful
WAN Technology
Read Text Preview

Extract of sample "WAN Technology"

WAN Technologies Replace with NETW206: Introduction to WAN Technologies w/Lab Submitted Dr. 09/09 WAN Technologies Thispaper will look into the preferred option for a wide area network (WAN) selection for ABC Inc’s branch offices located in Cleveland, Ohio. The first issue to consider in this regard is whether the WAN should be private or public. A public WAN would cost the company lower to install and maintain but would also entail lower reliability and security during use. In contrast, a private WAN would cost the company more to install and maintain but would provide greater reliability and security (Groth & Skandler, 2009).

Given the fact that ABC Inc’s online communication carries sensitive information such as banking records, employee personal information and trade secrets so it would be advisable to install a private WAN. Moreover, like any business ABC Inc cannot afford problems with the network connectivity due to low reliability since it would affect the customers and the business directly. Given the constraints on security and reliability there is little doubt that the solution for ABC Inc is a private WAN connection.

A dedicated private WAN would cost ABC Inc far more than using packet switched connectivity. It is common for multiple businesses to be using the same private WAN with packed switched connectivity since it affords the amount of reliability and security needed by businesses without entailing the extra cost of a dedicated private WAN (O’Brien & Marakas, 2009). Moreover, it is highly likely that the private WAN used by ABC Inc would utilize the frame relay protocol since it is more widely implemented than the X2.

5 protocol (Cisco, 2012). Using frame relay protocol would provide ABC Inc the required amount of reliability and security for its private WAN connection.ReferencesCisco. (2012, February 13). Frame Relay. Retrieved September 11, 2012, from Cisco: http://docwiki.cisco.com/wiki/Frame_RelayGroth, D., & Skandler, T. (2009). Network+ Study Guide, Fourth Edition. Sybex, Inc.O’Brien, J. A., & Marakas, G. M. (2009). Management Information Systems. New York: McGraw-Hill / Irwin.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“WAN Technology Research Paper Example | Topics and Well Written Essays - 250 words”, n.d.)
WAN Technology Research Paper Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1602822-wan-technology
(WAN Technology Research Paper Example | Topics and Well Written Essays - 250 Words)
WAN Technology Research Paper Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1602822-wan-technology.
“WAN Technology Research Paper Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1602822-wan-technology.
  • Cited: 0 times

CHECK THESE SAMPLES OF WAN Technology

WAN Structure: Advantages and Protocols

Normally, a computer network is categorized into three categories: local area network (LAN), metropolitan area network (MAN), and wide area network (wan) (Nash 5; Kimbleton and Schneider).... This paper presents a detailed analysis of wide area network (wan).... This paper will outline wan structure, its uses, advantages and protocols....
6 Pages (1500 words) Term Paper

Wide Area Network Design

This report presents a detailed analysis of some of the main aspects and areas of new technology based WAN network establishment at Acme Manufacturing.... Normally, a wan spans largely geographically distributed regions for example a wide area network can be established in two countries, two cities or in large landmasses across the globe.... However, the establishment… Additionally, at the present there exist various topologies and technical alternatives those can be used to build a wan....
4 Pages (1000 words) Essay

Information Security: Security Policies for the User Domain

The problem is the fact that intercepting authentication or other sensitive information can be executed with the current WAN Technology since it utilizes the traditional TCP/IP in user domains.... The User Domain, one of seven domains in an IT infrastructure, is considered to be the domain most at risk for attack and compromise, primarily due to the inherent weakness of the human interaction element....
6 Pages (1500 words) Term Paper

Attack Prevention Article Evaluation

The problem is the fact that intercepting authentication or other sensitive information can be executed with the current WAN Technology since it utilizes the traditional TCP/IP in user domains.... The User Domain, one of seven domains in an IT infrastructure, is considered to be the domain most at risk for attack and compromise, primarily due to the inherent weakness of the human interaction element....
2 Pages (500 words) Essay

Unit 5 Case Study Assignment 1

To achieve this crucial requirement it is recommended that a WAN Technology called, Asynchronous Transfer Mode (ATM) is put into use (Bagad and Dhotre, 2010).... The ATM technology fits well in this case study mainly because it supports high bandwidth networking solutions for data, voice and videos.... On the other hand, dedicated lease lines are also Canyon College case study It is essential to that the best Wide Area Network (wan) options for Canyon College are either Frame Relay or Dedicated Lease Lines....
1 Pages (250 words) Coursework

The Solution of VPN Connection

Goodall (2011) The problem is the fact that intercepting authentication or other sensitive information can be executed with the current WAN Technology since it utilizes the traditional TCP/IP.... After examining this scenario, it was clear that man elements were needed to ensure that this solution was secured, flexible, and provided many addresses ....
6 Pages (1500 words) Case Study

Sample Cyber Security Profile

The problem is the fact that intercepting authentication or other sensitive information can be executed with the current WAN Technology since it utilizes the traditional TCP/IP in user domains.... Commerce, transactions, and work are conducted through the internet and technology....
4 Pages (1000 words) Essay

WAN Architecture Overview

To achieve this goal, the adoption of WAN Technology stands out as the main way forward.... s), and other business stakeholders all around the globe are fighting tooth and nail to adopt a networking technology.... The paper "wan Architecture Overview" explains the success of any organization due to its ability to reach the customers.... s put the need for wan implementation.... One of the key features in promoting business competitiveness are the adoption of Wide Area Network (wan) connectivity....
6 Pages (1500 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us