StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

WAN Technologies - Essay Example

Cite this document
Summary
The server has self healing abilities to fix corrupted files as well as advanced network security with enhanced processing speed.
While WAN needs a router and a modem to connect to the…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92% of users find it useful
WAN Technologies
Read Text Preview

Extract of sample "WAN Technologies"

Computer science and information technology Computer science and information technology Novell Windows Mac UNIX Linux General Novell introduced powerful concepts like hierarchical directory structure. The latest version of Novell allows the use of protocol by the administrator.Windows newest version comprises of active directory with enhanced management tools. The server has self healing abilities to fix corrupted files as well as advanced network security with enhanced processing speed.Mac OS is very stable and powerful but primarily installed in Apple networks.

It is however capable of supporting non-Apple networks.Unix is an old but popular multitasking operating system that is capable of supporting large network operations.Linux is based on the principles of UNIX and available for free. It is very stable for multitasking. It can be incorporated with other software products to increase its functionality.System performanceHigh performanceHigh performanceHigh performanceHigh performanceHigh performanceRange of compatible hardwareModerateModerateModerateVery widewideMarket ShareWideWideWideVery widemoderateCostModerate Moderate Low Moderate Low StabilityVery stableVery stableVery stableVery stableVery stableStrength Effective file server Effective application serverFast and stableFast, flexible and stableAffordable, fast, flexible and stableLAN and WANMedia and devices usedWhile WAN needs a router and a modem to connect to the internet, LAN needs network interface card, a hub and a switch this is used to share resources like files, games and a printer.

This makes it easier to expand LAN than WAN (Muller 2003).Distance over which they operateSince LAN uses Ethernet cables, network adapters and hubs to connect, it cannot be used in a wide area as compared to WAN (Muller 2003). WAN uses private or public network transport like internet to connect to the network. WAN can be used to transmit data across different LANs on a global scale.The network and subnet topologyWAN uses the internet to connect different systems while LAN uses different forms of topology like star, ring and bus topology to connect the systems (Muller 2003).

The dominant communication protocolsTypes of protocol are distinguished by their capacity to convey data across different distances (Muller 2003). Ethernet is the most common LAN protocol mostly used in offices and homes. Internet protocol on the other hand is the most common WAN protocol used universally.Threats of a client/server systemThe clientSince the client’s machine can connect to the serve with ease, physical protection is needed to protect the organizational data and prevent viruses as well as loading unauthorized data (Ray 2009).

The networkData encryption should be used to protect computer systems from intruders using networks to access packets of information.The serverThere should be the use of passwords nod data needs to be encrypted so that the server can abort trial and error log in attacks.The userThe users need to use strong passwords and implement proper security policy to prevent leaking out passwords to UN authorized users who may use the passwords to access sensitive information in the system (Ray 2009).System securityThe system security needs to be enhanced to ensure safe transmission of data between the client and the server.

Challenges of setting WAN in global scaleThe major challenges of setting up a global WAN connection are the difference in time zones and language barrier. By optimizing the WAN, the time taken to conduct different processes like downloading important data will be hugely reduced and enhance the productivity of the organization. According to Marcus (1999), the security of data also needs to be enhanced to safeguard the data from people that might want to corrupt the data of use it for unauthorized purposes.

ReferencesTop of FormMuller, N. (2003). LANs to WANs: The Complete Management Guide. Norwood: Artech House. Top of FormRay, C. (2009). Distributed database systems Delhi: Pearson Top of FormMarcus, J. S. (1999). Designing wide area networks and internetworks: A practical guide Reading, Mass: Addison-Wesley.Bottom of FormBottom of FormBottom of Form

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“WAN Technologies Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
WAN Technologies Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1698643-wan-technologies
(WAN Technologies Essay Example | Topics and Well Written Essays - 500 Words)
WAN Technologies Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1698643-wan-technologies.
“WAN Technologies Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1698643-wan-technologies.
  • Cited: 0 times

CHECK THESE SAMPLES OF WAN Technologies

Review of Telephone and Data Network

The second network segment is connected to all the servers, and the third network segment consists of network devices that are connected to the wan interface.... Lastly, the sixth segment indicates wan segment including devices that are required to communicate with the wan interface.... One of the three network segments is proving connectivity to the wan devices.... This includes workstations, network components, servers, wan devices and many more....
12 Pages (3000 words) Research Paper

Enterprise Technologies and the Value Chain

 This paper "Enterprise technologies and the Value Chain" examines the potential of mobile technology in providing value for various activities in an organization.... Mobile technologies that support mobile businesses are grouped as networks and devices.... Benefits that are a result of mobile technology include the saving of costs and optimization of quality control....
3 Pages (750 words) Research Paper

WAN Technology

In contrast, a private WAN would cost the company more to… Given the fact that ABC Inc's online communication carries sensitive information such as banking records, employee personal information and trade secrets so it would be advisable WAN Technologies Replace with NETW206: Introduction to WAN Technologies w/Lab Submitted Dr.... 09/09 WAN Technologies Thispaper will look into the preferred option for a wide area network (WAN) selection for ABC Inc's branch offices located in Cleveland, Ohio....
1 Pages (250 words) Research Paper

Evaluate Wide Area Network (WAN) technologies

WAN uses two technologies namely;… Packet switching allows users to share carrier resources and utilize infrastructure.... Circuit switching on the other hand allow the data connection Evaluate Wide Area Network (WAN) technologies.... WAN uses two technologies namely; packet switching and circuit switching.... A wan is established by switches and routers interconnected together.... Number wan refers to a computer network covering broad geographical areas such as cities, countries and even continents....
2 Pages (500 words) Essay

RACI Chart Analysis

WAN Technologies are different in terms of speed, cost, and bandwidth.... The other type of a network is wide area network (wan) which connects a single office to the parent organization.... wan usually covers a wide area such as a metropolitan, regional, or national.... Only a few organizations have the resources for building and maintenance of their own wan links, and is usually more cost-effective to lease them from the local phone or Cable Company....
5 Pages (1250 words) Coursework

The Processes that Occur in a Network

Thorough knowledge of these devices and their roles, protocols, and associated technologies, at various levels of the network, is required for understanding the process that takes place in a network for communication to occur successfully.... The process that occurs on the network is mainly the study of data as it travels through the TCP/IP stack because wan is only used as a vehicle....
8 Pages (2000 words) Coursework

The Connection between Human and Technologies

This paper “The Connection between Human and technologies” is aimed to uncover the arguable issue of being a human in a futuristic world of technologies, how the definition of human changes with the introduction of cyber technologies in the people's everyday lives.... The human's life and technologies are connected nowadays....
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us