Verified Document

WAN Switching Discuss The Types Of Switching Term Paper

WAN Switching Discuss the types of switching expected to be found on a WAN. How do the different types of switching in a WAN influence the security of transmission? Comment on variations and the availability of the tools to help with the implementation of security measures.

According to the Internet search definition archive Webopedia, a WAN or wide area access network is a type of computer network that spans a relatively large geographical area. Typically, a WAN consists of two or more computer networks or LANs, local area access networks www.webopedia.com/TERM/W/local_area_network_LAN.html." Computers connected to a wide-area network are often connected through interconnected public networks, such as the telephone system, or through dial-up connections. These WANs can also be connected through leased lines or satellites. The largest WAN in existence is the Internet, but smaller WANs such as within geographical areas of cities, companies, or university complexes or between academic areas can exist.

Leased lines, unlike dial-up connections, are always active. Such cable or broadband connections tend to be faster than dial-up connections but they are not necessarily more secure. Applying bandwidth management, application layer monitoring,...

(Hotchmuth & Connor, 2004)
For instance, the use of remote office storage and caching appliances can be used to eliminate remote file servers, storage and back-up devices from branch offices, while boosting performance of centrally hosted Unix-, Linux- and Windows-based applications. Such efforts can also increase security, as diminishing…

Sources used in this document:
Works Cited

Hotchmuth & Connor (July 5, 2004) "CISCO buy to link remote resources." http://www.nwfusion.com/cgi-bin/mailto/x.cgi

Newman, Robert C. (2003). Enterprise Security. Upper Saddle River, New Jersey: Prentice Hall.

WAN." (2003) Webopedia. http://www.webopedia.com/TERM/W/wide_area_network_WAN.html
Cite this Document:
Copy Bibliography Citation

Related Documents

ATM Asynchronous Transfer Mode Networks
Words: 1450 Length: 5 Document Type: Term Paper

ATM (Asynchronous Transfer Mode Networks) This report aims to discuss Asynchronous Transfer Mode, known simply as ATM technology, as it pertains to Networking in a detailed and coherent manner. "It is clear that Asynchronous Transfer Mode (ATM) technology will play a central role in the evolution of current workgroup, campus and enterprise networks. "The ATM protocol is flexible enough to be used not only for local and wide area network applications,

Lte Long-Term Evolution
Words: 3505 Length: 10 Document Type: Research Paper

LTE (Long-Term Evolution) Long-Term Evolution (LTE) A Summary of LTE Implications for Stakeholders Application of Theories Structured Cabling Issues Technical Specifications Operations Plan Feasibility Study Features of LTE Past Technologies The Best Choice? Long-Term Evolution (LTE) A Summary of LTE Long-term evolution (LTE) is an emerging technology. It is a standard in wireless communication, and relates to the effective and efficient transfer of high-speed data for both data terminals and mobile phones (Sesia, Toufik, & Baker, 2011). Based on GSM/EDGE as well as UMTS/HSPA

Management and Decision Sciences From
Words: 25680 Length: 90 Document Type: Thesis

76). As automation increasingly assumes the more mundane and routine aspects of work of all types, Drucker was visionary in his assessment of how decisions would be made in the years to come. "In the future," said Drucker, "it was possible that all employment would be managerial in nature, and we would then have progressed from a society of labor to a society of management" (Witzel, p. 76). The

Wireless Clients Offsite Secure Hosting
Words: 2316 Length: 8 Document Type: Book Report

So as to receive the infrared signals, the receivers can be placed at any location within the office space. The spread spectrum WLANs This system makes use of multiple-cell configuration. This is to say that each of the cells in the arrangement is assigned a certain center frequency that is unique and that lies within a chosen band as to eliminate chances of signal interference. The system employs frequency hopping and

Network Management Information Technology Management
Words: 2226 Length: 8 Document Type: Thesis

). Such security should also preplan strategic responses to attacks associated with the network (Dawkins et al.). A book entitled "Surviving Security: How to Integrate People, Process, and Technology" explains that the rapid expansion networking and networking technologies necessitates greater security needs. The author asserts that parts of the network such as routers, switches and even network printers are vulnerable (Andress). The article further explains that the router or switch contained

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now