Verified Document

Routers, Lans, Mans, And Vlans Routers Have Term Paper

Routers, LANs, MANs, and VLANs Routers have long been an important component in a network beginning with the transmission of data traffic. With VoIP on its way it will also evolve to support voice traffic as well. It does so today in a lab and test environment as well as limited VoIP deployment.

What security functions does a router provide and are these functions adequate for securing the LAN or MAN?

Internet Voice, also known as Voice over Internet Protocol (VoIP), is a technology that allows a caller to make telephone calls using a broadband Internet connection instead of a regular (or analog) phone line. Some services using VoIP only allow a caller to reach other people using the same service. Other services allow calls to anyone with a telephone number, including local, long distance, mobile, and international numbers. Some services only work over a computer or a special VoIP phone. Other services allow a traditional phone connection through an adaptor. The one feature all VoIP technologies share is that for the individual calling out, the caller must be equipped with a broadband or high speed Internet connection, usually through a cable modem, or high speed services such as DSL or a local area network. (VoIP, 2003)

Routers have always been necessary for making connections between different networking standards such as...

These connections will be necessary for VoIP as well as to continue current connections via text. But how to make this secure, when a user hooks up an inexpensive microphone to a computer and sends his or her voice through a cable modem or connect a phone directly to a telephone adaptor?
Firstly, one must understand that a router is generally an OSI layer 3 device that use an IP address instead of MAC address for the destination of a data packet. Therefore, it is hardware independent and gives network designer more flexibility. A router can divide network into different subnets, thus making Internet sharing possible. Because routers use software method to control the network traffic, they are generally slower than switches. Therefore, the use of routers for most business is limited to Internet connection sharing through NAT routers. In a wide area network (WAN), routers are necessary for connections between different networking standards such as the connection between Ethernet and ATM. (Yeh, 2002) A MAN (Metropolitan Area Network) is defined as a network that connects different LANs within the same Metropolis. Examples include campus networks and industrial networks that connect factories and office buildings together. (Newman, 2003)

The most popular MAN standard today is ATM. ATM was created during the…

Sources used in this document:
Works Cited

Newman, Robert C. (2003). Enterprise Security. Upper Saddle River, New Jersey: Prentice Hall.

VLAN -- Definition." (2004) Webopedia. Retrieved on July 15, 2004 at http://net21.ucdavis.edu/newvlan.htm

VLAN Information." (2004) Retrieved on July 15, 2005 at http://net21.ucdavis.edu/newvlan.htm

VoIP. (2003) Retrieved on July 15, 2005 at http://www.fcc.gov/voip/
Yeh, Albert. (2002). "Introduction To LAN and Switches." Ovislink. Retrieved on July 15, 2005 at http://www.ovislink.com.tw/lanintro.htm
Cite this Document:
Copy Bibliography Citation

Related Documents

IP Address
Words: 554 Length: 2 Document Type: Term Paper

Private IP Address The use of a private IP address on a business computer network has a number of advantages, one being an improved network security as well as a corporate social responsibility of conserving public addressing space. These IP addresses are commonly used on local networks and are good for businesses that share data as well as voice information. The company's computer network will not connect to the internet with this

Ip Address and Security
Words: 3513 Length: 16 Document Type: Essay

Kris Corporation's parent domain (kris.local) and child domain (corp.kris.local) for the organization's AD infrastructure are running on Server 2008. The following are concerns related to AD: (1) Kris Corporation is concerned about running multiple domains, and (2) automobile manufacturers are asking Kris Corporation to use a single identity to procure orders in real time. The company has five locations in Atlanta (GA), Baltimore (MD), Chicago (IL), Seattle (WA) and San

TCP IP Protocol
Words: 1088 Length: 3 Document Type: Term Paper

TCP/IP Protocol Suite For the average computer user, TCP/IP probably doesn't mean a whole lot, except maybe when it comes to "configuring" their computer so they can get online, but without the TCP/IP protocol, the activity experienced on the Internet up until this point would not be possible. This paper will examine some of the components of the TCP/IP protocol and explore their uses as they apply to relevant parts

Voice Over IP VOIP Security
Words: 1789 Length: 4 Document Type: Term Paper

Voice over IP (VoIP) Security Voice over Internet Protocol or VoIP refers to making use of telephone services over that of the computer networks. During the first part of the process, the VoIP makes an analog signal which is evolved from the speaker's voice. It is then transferred to a digital signal and further transfers over that of an IP network and this is well inclusive of the Internet. Voice over

China IP China's Intellectual Property Rights Protections
Words: 1981 Length: 7 Document Type: Essay

China IP China's intellectual property rights protections have come a long way since 1978, but there remains room for improvement. While the de jure situation with respect to protecting intellectual property rights approaches Western standards, the enforcement or de facto situation is less encouraging. Western companies have a difficult time enforcing the patchwork of laws and often fail to win judgments significantly large to serve as a deterrent to IP thieves. There

Computer Forensic Investigation Making an
Words: 3228 Length: 12 Document Type: Research Paper

Typically, a database uses either the simple recovery model or the full recovery model. The full recovery model can be supplemented by switching to the bulk-logged recovery model before bulk operations." (Microsoft, 2010 P. 2). Meanwhile, our company will need to implement the full back up safeguard all our data. Under the full recovery model, the first step is to back up the transaction log. Combination of full back-up with

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now