StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

CIS204 U4 Discussion - Coursework Example

Cite this document
Summary
These areas might be spread out across wide geographical locations. WANs can also be used to create connections between smaller networks such as LANs and MANs (Edraw 2015). For the…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.5% of users find it useful
CIS204 U4 Discussion
Read Text Preview

Extract of sample "CIS204 U4 Discussion"

Establishing a Wide Area Network (WAN) for a Resort al Affiliation Establishing a Wide Area Network (WAN) for a Resort IntroductionWide Area Networks (WAN) are computer networks used to develop connections between several areas. These areas might be spread out across wide geographical locations. WANs can also be used to create connections between smaller networks such as LANs and MANs (Edraw 2015). For the skiing company in Stratton, a computer network can be created between the company’s site and the newly established branch in Stowe.

The most recommended technology would be the Virtual Private Network, since it fits the organizational needs and the budget as well.VPNs are known to establish a connection through a Public Switched Network (PSTN). The connection created in the WAN is however private and secured, and cannot be accessed by the public. VPNs are good at establishing business connections between two sites using the IPsec or the Internet Protocol Security (IPS). The reason as to why this technology has been recommended to the company is the security in information flow.

The technology is also good for connecting man sites, which can be helpful for customer care services. The numerous rooms in the hotel premise can all be connected to the customer care.Advantages of this type of technology is the cost associated with establishing it (Thrivenetworks 2015). Companies can establish the network at a cheaper price than in any other technologies used. The network is also highly protected from access by unauthorized people. This security ensures more secure communication by the people in it.

For growing companies, this technology proves to be the most ideal as it does not need addition of other components so as to accommodate new users (Thrivenetworks 2015). Disadvantages of this technology are the complexity involved when there is addition of new infrastructure, and the security issues involved when using a mobile device to establish connection (Thrivenetworks 2015).Conclusion WAN establishes a computer connection between two points. Several technologies can be used to establish connections between sites.

VPN connection proves to be the best for business organizations due to the low cost and high level of security. For the business organizations, the best option for wireless solution would be a Cisco Network. The network could be configured to have a central switch board for easy control. This system would also be highly compatible with the VPN technology established.ReferencesEdraw. (2015). Wide Area Network Technologies - Design and Implement High-quality WAN Networks. Retrieved from http://www.edrawsoft.com/Wide-Area-Network.

phpThrivenetworks. (2015). The Pros and Cons of Using a Virtual Private Network. Retrieved from http://www.thrivenetworks.com/blog/2011/07/28/the-pros-and-cons-of-using-a-virtual-private-network/

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“CIS204 U4 Discussion Coursework Example | Topics and Well Written Essays - 250 words”, n.d.)
CIS204 U4 Discussion Coursework Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1683651-cis204-u4-discussion
(CIS204 U4 Discussion Coursework Example | Topics and Well Written Essays - 250 Words)
CIS204 U4 Discussion Coursework Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1683651-cis204-u4-discussion.
“CIS204 U4 Discussion Coursework Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1683651-cis204-u4-discussion.
  • Cited: 0 times

CHECK THESE SAMPLES OF CIS204 U4 Discussion

U4 Discussion

Moreover, the use VLANs to boost security, enhance network performance and u4 discussion Factors That Influence To Suggest A VLAN and Types Of Things Would The Client Need To Describe.... The factors that influence VLAN to the clients include the ability of VLAN to meet the requirements of wide range of users and provide better security....
1 Pages (250 words) Coursework

U4 Discussion

Considering both file permissions and shared folder permissions (and any other situation that may be applicable), what steps would you go through… List the different reasons the user may be having trouble accessing the file. Trouble shooting a problem on a computer network works if one follows a logical u4 discussion u4 discussion Part I Consider the situation in which a user is trying to access a file through a network share....
1 Pages (250 words) Coursework

Comparing Windows With Linux

It also concerns the ability of the filesystem to be increased or reduced and limitations that come with it (Basta, 2013).... We also consider its compatibility with a majority of the other… It is also vital to consider the length of its fsck which determines whether it's or not journalized. I use exFAT filesystem because it saves me the time of having to format the drive when shifting from the two operating systems I use i....
1 Pages (250 words) Coursework

CIS206 U5 Research Assignment

It starts by outlining the duties of an administrator that generally involve ensuring the system functions as intended.... Although the tasks… They also perform backups, documentation, auditing and troubleshooting of security features, and helping users (Malone 2011). The administrator accomplishes the Administering a UNIX User Environment Administering a UNIX User Environment The article, Unix Administration, by David Malone focuses on various aspects that involve the administration of the UNIX user environment....
1 Pages (250 words) Essay

CIS212 U1 Discussion

It is inclusive of how the security controls are.... It has to be in a manner that advances the security and integrity of the data in the… It also ensures that users are not services that should be available at all times.... Testing will ensure a smooth operation and prevent attacks that take advantage of obsolete concepts....
1 Pages (250 words) Essay

CIS212 U3 Discussion

Access control tools are concerned with determining the allowed activities of legitimate users, mediating between every attempt by a user to access a particular resource in the system.... Its main objective is to make sure that undesired users do not get access to certain… Role-based access control and Discretionary Access Control both are based on defining the roles and adding each user to the system....
1 Pages (250 words) Essay

CIS256 U3 Discussion

These names represent the names of particular hosts.... When the domain name is said to be fully qualified, it means that the hostname is a… For instance, gendersoft.... omain.... om. I would prefer Microsoft domain name service as compared to BIND DNS.... The reasons for this include the centrality of access to the role as a part of the Windows server package (Minasi, 2014)....
1 Pages (250 words) Essay

How the Idea of Architecture Is Being Conveyed

The term can be used to denote the science and art of designing buildings and other physical non-building structures (Zumthor, 2008).... Architecture in buildings seek to help provide… What does this imply?... It means architectural works or architectural designs communicate certain information to those who interact with them....
8 Pages (2000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us