Verified Document

LAN And WAN Analysis Current Release OS Essay

Related Topics:

¶ … LAN and WAN Analysis Current Release

OS X Mountain Lion

Linux kernel 3.4; GNU C. Library

Windows Server 2008 R2 (NT 6.1.7600)

S-Net

SP

IBM AIX Variant

(UNIX System V Release

Range of compatible hardware

Low

Performance

High for fine-tuned applications to the processor and O.S. API calls (1)

Very High for natively-written applications

Medium for applications using emulation mode; very high for 64-bit applications

Slow for applications emulating MS-Windows; fast for direct API-call based applications

Very high for applications written directly to the UNIX API; support for emulated API calls slows down performance

Corporate Acceptance

Medium

Very High

Very High

Medium

High

Installed Base

Millions of Users

Millions of Users

Millions of Users

Thousands of Users

Millions of Users

Directory Services Power

Medium; not as well defined as Microsoft

Very Strong; supporting taxonomies

Very Strong with Win64-based Directories

Very High; the operating system is based on this

High

Stability

High

Very High; strong base of developers

Very High; Microsoft now into 3rd gen.

Moderate; Novell is seeking a new revenue model

Very High

Software Cost

Very High

Low to Free

High including site licensing

Medium to High

Medium to High

TCP/IP Support

Partial of the entire TCP/IP command set

Full support due to the developer community

Full support with advanced security

Partial of the entire TCP/IP command set

Full support due to the developer community

Security Strength

Strong; now several generations into this operating system

Very strong; global developer base continues to refine it

Medium to Strong; needs more focus on enterprise support

File Server; NDS make this one of the most secure server operating systems

Very strong, especially the IBM AIX operating system

(1) Application Programmer Interface (API) calls

Sources: (Bajgoric, 2003) (Bradley, 2009)(Cass, 2003) (Hong, Rezende, 2012) (MacKinnon, 1999)...

Describe how LANs and WANs differ in each of these aspects.
A Local Area Network (LAN) and Wide-Area Network (WAN) are differentiated in how they rely on different media types, devices used in their configuration and use, networks and subnet topologies and communications protocols. All of these factors taken together differentiate these two approaches to enterprise-wide networking.

A LAN is often used throughout a small geographic region and in companies, often used only in a single business or at most, a small office complex. A WAN is a much broader network in structure, covering metropolitan, regional, national and international boundaries. The speed of a LAN is significantly faster, with 1K MBps being typical while WANs average 150 MBps. LANs are also often created in Ethernet and Token Ring configurations while WANS are often designed to ensure X.25 connectivity and advanced ATM support across longer distances. From a components standpoint, LANs are often based on Layer 2 devices including switches and bridges, with additional support from Layer 1 devices including hubs and repeaters. WANs are often created on a foundation of Layer 3 routers, multi-layer switches and technology-specific devices including advanced frame-relay and ATM switching devices.

Dominant communications protocols on LANs including CSMA/CA-based protocols that seek to alleviate data packet collisions on a network. Collision Avoidance is the foundation of the IBM Token Ring protocol for example. Both LAN and WAN configurations also run the standard TCP/IP networking protocols based on the CSMA/CD standard approach to managing collision detection across networks.

You are hired by a firm that has offices in Peru, France, United States and Hungary. Your job is to coordinate a team of IT employees to connect all of the individual sites into one large WAN. Explain what the personnel implications are when setting up a WAN on a global basis. What are some of the barriers involved with global teams?

In addition to the obvious cultural factors that need to be planned on and managed well from a change management standpoint, the correct mix of technical skills is also critically important. This requires transformational leadership skills that can take into account the cultural strengths of each member of the team while also seeking to create a unified and highly…

Sources used in this document:
references in server operating systems: A case of Linux vs. windows. Journal of Econometrics, 167(2), 494.

MacKinnon, James G. (1999). The Linux operating system: Debian GNU/Linux. Journal of Applied Econometrics, 14(4), 443-452.

Spinellis, D., & Giannikas, V. (2012). Organizational adoption of open source software. The Journal of Systems and Software, 85(3), 666.

Tankard, C. (2012). Taking the management pain out of active directory. Network Security, 2012(4), 8-11.
Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Security: Corporate Security Documentation Suitable for
Words: 5280 Length: 19 Document Type: Essay

Computer Security: Corporate Security Documentation Suitable for a Large Corporation Item (I) in-Depth Defense Measures (II) Firewall Design (III) Intrusion Detection System (IV) Operating System Security (V) Database Security (VI) Corporate Contingency of Operation (VII) Corporate Disaster Recovery Plan (VIII) Team Members and Roles of Each (IX) Timeline with Goal Description (X) Data Schema (XI) Graphical Interface Design (XII) Testing Plan (XIII) Support Plan (XIV) Schematics Computer Security: Corporate Security Documentation Suitable for a Large Corporation (I) In-Depth Defense Measures Information Technology (IT) Acceptable Use Policy The intentions of

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now