Explore BrainMass

Wide Area Networks

This content was STOLEN from BrainMass.com - View the original, and get the already-completed solution here!

Describe the general type of WAN connections and network hardware that will be used to interconnect offices.

© BrainMass Inc. brainmass.com October 24, 2018, 9:51 pm ad1c9bdddf

Solution Preview

Wide-area networks (WANs) are used to connect LANs and other types of networks together, so that users and computers in one location can communicate with users and computers in other locations. Typically, a WAN consists of two or more local-area networks (LANs).

Computers connected to a wide-area network are often connected through public networks, such as the telephone system. They can also be connected through leased lines or satellites. A WAN connects computers at two sites in different regions or even different countries by transmitting data over a ``point-to-point'' link. A link is usually established over analog or digital telephone lines and, for worldwide connections, data may be relayed via communications satellites. A point-to-point link can also be established over a dedicated serial line if the hardware at each end is capable of maintaining sufficient signal strength over the distance between the systems.

Analog transmission requires the use of a modem to convert or ``modulate'' digital data into an analog audio form so it can be sent over a telephone line, and another modem at the receiving end to convert or ``demodulate'' the analog signal back into digital data. The bandwidth of an analog telephone line is usually 3000Hz (3000 cycles per second) but sophisticated encoding and compression techniques allow the transmission of data at up to 56.6kbps over suitably noise-free lines.

Digital transmission over ISDN (integrated services digital network) lines uses ...

Solution Summary

The general type of WAN connections and network hardware that are used to interconnect offices are described.

See Also This Related BrainMass Solution

Emergency evacuation plans and security management

Answer 5 of the 8 questions presented. Please answer your selected questions fully and completely. Please insert page breaks between each question. List questions in order by their assigned question number.

Instructions: Use original thought. Be creative; do not limit yourself to conventional thinking. Learn to think out of the box and expand your answers and solutions.
Covers all Chapters in Introduction to Security, 8th Edition, by Robert J. Fischer and Gion Green, Answer 5 of the 8 questions presented. This is an essay your response to each question should be 1-2 pages, double spaced, in length. Start each new question at the top of a new page. Please answer your selected questions fully and completely.

Assessment: You are evaluated on how well you present your work and how clear you express the basic guidelines and philosophical approached to study of security management.

1. When management is developing a plan for emergency evacuations, what things need to be considered?

2. What are the legal implications that accompany the arrest of a shoplifter?

3. In context of security management discuss and define controlled areas, limited areas and exclusion areas?

4. How are local area networks (LANs) and the World Wide Web (WWW) security issues?

5. Why is total evacuation of a facility a drastic reaction to a bomb threat? Discuss potential hazards of evacuation.

6. Discuss intervention and the various steps necessary in preventing and responding to workplace violence.

7. In regards to management, discuss the hiring process and three important items that an employer should look for in a perspective employee?

8. List several major trends for security in the 21st century. Discuss their significance from a management perspective?

View Full Posting Details