SlideShare a Scribd company logo
Summarize the purpose of a WAN and define what makes up a WAN connection.
Detail the types of devices used to establish and maintain a WAN connection and list some of the
more common WAN connection methods.
Discuss the differences between WAN and LAN connections, and who is responsible for
providing WAN connections.
Discuss how a modem handles digital information over analog signals.
Describe how to configure and setup remote access protocols.
What factors need careful consideration?
Solution
Remote Access Protocols
Remote access protocols square measure accustomed management the institution of connections
and therefore the transmission of information over WAN links. 3 varieties of remote access
protocols square measure supported by Windows Server 2003 remote access:
Point-to-Point Protocol (PPP): AN industry-standard set of protocols providing the most
effective security, multi-protocol support and ability.
Serial Line net Protocol (SLIP): employed by older remote access servers. A Windows Server
2003 RAS server doesn't support SLIP dial-up connections.
Microsoft remote access protocol: additionally called Asynchronous NetBEUI (AsyBEUI) and is
employed by inheritance remote access purchasers, like Windows NT three.1, Windows for
Workgroups, DOS and computer network Manager purchasers.
LAN may be a electronic network that connects computers in tiny areas. WAN may be a network
that covers a broad space victimization personal or public network transports.
The terms {lan|local square measurea network|LAN|computer network} and WAN are usually
confusing for those that aren’t that school savvy. These square measure each connections that
permit users to attach their laptop to a network, as well as the web. computer network is brief for
native space Network, whereas WAN is brief for Wide space Network. These 2 disagree from
one another in distinct ways that. computer network may be a electronic network that connects
computers in tiny areas like home, office, school, corporation, etc. employing a network media.
it's helpful for sharing resources like printers, files, games, etc. A computer network network
includes a few of laptop systems connected to every alternative, with one system connected to a
router, electronic equipment or AN outlet for net access. The computer network network is made
victimization cheap technologies like local area network cables, network adapters and hubs.
However, alternative wireless technologies are obtainable to attach the pc through a wireless
access. so as to put together a computer network network, an individual might also need
specialised software system software system. the foremost widespread software system includes
the Microsoft Windows’ net affiliation Sharing (ICS), that permits users to make computer
network. distinction between computer network and WAN
Key Difference: computer network may be a electronic network that connects computers in tiny
areas. WAN may be a network that covers a broad space victimization personal or public
network transports.
The terms {lan|local square measurea network|LAN|computer network} and WAN are usually
confusing for those that aren’t that school savvy. These square measure each connections that
permit users to attach their laptop to a network, as well as the web. computer network is brief for
native space Network, whereas WAN is brief for Wide space Network. These 2 disagree from
one another in distinct ways that.
LAN may be a electronic network that connects computers in tiny areas like home, office,
school, corporation, etc. employing a network media. it's helpful for sharing resources like
printers, files, games, etc. A computer network network includes a few of laptop systems
connected to every alternative, with one system connected to a router, electronic equipment or
AN outlet for net access. The computer network network is made victimization cheap
technologies like local area network cables, network adapters and hubs. However, alternative
wireless technologies are obtainable to attach the pc through a wireless access. so as to put
together a computer network network, an individual might also need specialised software system
software system. the foremost widespread software system includes the Microsoft Windows’ net
affiliation Sharing (ICS), that permits users to make computer network.
The first thriving computer network network was created by Cambridge in 1974 called the
Cambridge Ring; but it had been not commercial till 1976 by Datapoint Corporation. Datapoint’s
ARCNET was put in at Chase Manhattan Bank in big apple in 1977. the most purpose of making
a computer network was to share storage and alternative technologies like printers, scanners, etc.
the tiniest computer network will embody 2 computers, whereas the biggest will, in theory,
support sixteen million devices per regarding.com. Wikipedia states that “the larger LANs square
measure characterised by their use of redundant links with switches victimization the spanning
tree protocol to forestall loops, their ability to manage differing traffic varieties via quality of
service (QoS), and to segregate traffic with VLANs.” The larger LANs additionally use
alternative devices like switches, firewalls, routers, load balancers, and sensors.
An analog-digital converter, or ADC because it is a lot of unremarkably referred to as, may be a
device that converts analog signals into digital signals. Analog data is transmitted by modulating
a continual transmission signal by amplifying a signal's strength or variable its frequency to
feature or deduct knowledge. Digital data describes any system supported discontinuous
knowledge or events. Computers, that handle knowledge in digital kind, need analog-to-digital
converters to show signals from analog to digital before it are often scan. One example may be a
electronic equipment that turns signals from digital to analog before sending those signals over
communication lines like phonephone lines that carry solely analog signals. The signals square
measure turned back to digital kind (demodulated) at the receiving finish so the pc will method
the information in its digital format.
ATM
Cable electronic equipment
Dial-up
DSL
ISDN
Leased line
SONET
X.25
SD-WAN

More Related Content

Similar to Summarize the purpose of a WAN and define what makes up a WAN connec.pdf

Chapter 6.0
Chapter 6.0Chapter 6.0
Chapter 6.0
Adebisi Tolulope
 
Computer network note
Computer network noteComputer network note
Computer network note
MdAnikKhan
 
Computers and more
Computers and moreComputers and more
Computers and more
manuelestuardo15
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
K. A. M Lutfullah
 
10 New Web Application and Security.pptx
10 New Web Application and Security.pptx10 New Web Application and Security.pptx
10 New Web Application and Security.pptx
AkshayIngole17
 
Computer Networks By NADEEM AHMED
Computer Networks By NADEEM AHMED Computer Networks By NADEEM AHMED
Computer Networks By NADEEM AHMED
NA000000
 
Lecture-03 - Introduction To Network.pptx
Lecture-03 - Introduction To Network.pptxLecture-03 - Introduction To Network.pptx
Lecture-03 - Introduction To Network.pptx
Md. Sakhawat Hossain
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of network
ammulu99
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
Rodel Morales
 
Computer Network Second Edition
Computer Network Second EditionComputer Network Second Edition
Computer Network Second Edition
Md Saylab
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
IRJET Journal
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
Kate Campbell
 
Networking
NetworkingNetworking
Networking
Joseph Zacharia
 
Network Fundamentals.pdf
Network Fundamentals.pdfNetwork Fundamentals.pdf
Network Fundamentals.pdf
Home
 
London Atil | Data Communication & Computer Network
London Atil | Data Communication & Computer NetworkLondon Atil | Data Communication & Computer Network
London Atil | Data Communication & Computer Network
LondonAtil1
 

Similar to Summarize the purpose of a WAN and define what makes up a WAN connec.pdf (20)

Chapter 6.0
Chapter 6.0Chapter 6.0
Chapter 6.0
 
Computer network note
Computer network noteComputer network note
Computer network note
 
Computers and more
Computers and moreComputers and more
Computers and more
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
Network hardware
Network hardwareNetwork hardware
Network hardware
 
10 New Web Application and Security.pptx
10 New Web Application and Security.pptx10 New Web Application and Security.pptx
10 New Web Application and Security.pptx
 
Computer Networks By NADEEM AHMED
Computer Networks By NADEEM AHMED Computer Networks By NADEEM AHMED
Computer Networks By NADEEM AHMED
 
Lecture-03 - Introduction To Network.pptx
Lecture-03 - Introduction To Network.pptxLecture-03 - Introduction To Network.pptx
Lecture-03 - Introduction To Network.pptx
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of network
 
Cnetworks
CnetworksCnetworks
Cnetworks
 
Cn
CnCn
Cn
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
viddu Network
 viddu Network viddu Network
viddu Network
 
Computer Network Second Edition
Computer Network Second EditionComputer Network Second Edition
Computer Network Second Edition
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
Networking
NetworkingNetworking
Networking
 
Network Fundamentals.pdf
Network Fundamentals.pdfNetwork Fundamentals.pdf
Network Fundamentals.pdf
 
Networking
NetworkingNetworking
Networking
 
London Atil | Data Communication & Computer Network
London Atil | Data Communication & Computer NetworkLondon Atil | Data Communication & Computer Network
London Atil | Data Communication & Computer Network
 

More from FOREVERPRODUCTCHD

You are asked with writing a program in C that manages contact infor.pdf
You are asked with writing a program in C that manages contact infor.pdfYou are asked with writing a program in C that manages contact infor.pdf
You are asked with writing a program in C that manages contact infor.pdf
FOREVERPRODUCTCHD
 
Write a short paragraph explaining what the exploit does in Assembly.pdf
Write a short paragraph explaining what the exploit does in Assembly.pdfWrite a short paragraph explaining what the exploit does in Assembly.pdf
Write a short paragraph explaining what the exploit does in Assembly.pdf
FOREVERPRODUCTCHD
 
Write a program to convert a given INFIX into POSTFIX. Make sure .pdf
Write a program to convert a given INFIX into POSTFIX. Make sure .pdfWrite a program to convert a given INFIX into POSTFIX. Make sure .pdf
Write a program to convert a given INFIX into POSTFIX. Make sure .pdf
FOREVERPRODUCTCHD
 
What quality control mechanisms should major accounting firms have i.pdf
What quality control mechanisms should major accounting firms have i.pdfWhat quality control mechanisms should major accounting firms have i.pdf
What quality control mechanisms should major accounting firms have i.pdf
FOREVERPRODUCTCHD
 
What are three basic ethical principles for journalism Why are ethi.pdf
What are three basic ethical principles for journalism Why are ethi.pdfWhat are three basic ethical principles for journalism Why are ethi.pdf
What are three basic ethical principles for journalism Why are ethi.pdf
FOREVERPRODUCTCHD
 
What are some of the different versions of UNIX® Why is it importan.pdf
What are some of the different versions of UNIX® Why is it importan.pdfWhat are some of the different versions of UNIX® Why is it importan.pdf
What are some of the different versions of UNIX® Why is it importan.pdf
FOREVERPRODUCTCHD
 
Type in your own words In details, discuss the following questions.pdf
Type in your own words In details, discuss the following questions.pdfType in your own words In details, discuss the following questions.pdf
Type in your own words In details, discuss the following questions.pdf
FOREVERPRODUCTCHD
 
Twice a first number decreased by a second number is 11. The first nu.pdf
Twice a first number decreased by a second number is 11. The first nu.pdfTwice a first number decreased by a second number is 11. The first nu.pdf
Twice a first number decreased by a second number is 11. The first nu.pdf
FOREVERPRODUCTCHD
 
the largest drum ever constructed was played at the Rotal festival H.pdf
the largest drum ever constructed was played at the Rotal festival H.pdfthe largest drum ever constructed was played at the Rotal festival H.pdf
the largest drum ever constructed was played at the Rotal festival H.pdf
FOREVERPRODUCTCHD
 
Suppose that the material that you are recrystallizing fails to perc.pdf
Suppose that the material that you are recrystallizing fails to perc.pdfSuppose that the material that you are recrystallizing fails to perc.pdf
Suppose that the material that you are recrystallizing fails to perc.pdf
FOREVERPRODUCTCHD
 
SOS Please please please help on this problem!!!!!!!!!!!!!!!!!!!!!! .pdf
SOS Please please please help on this problem!!!!!!!!!!!!!!!!!!!!!! .pdfSOS Please please please help on this problem!!!!!!!!!!!!!!!!!!!!!! .pdf
SOS Please please please help on this problem!!!!!!!!!!!!!!!!!!!!!! .pdf
FOREVERPRODUCTCHD
 
Step 12 The task is complete when the quota can be verified. Take a.pdf
Step 12  The task is complete when the quota can be verified.  Take a.pdfStep 12  The task is complete when the quota can be verified.  Take a.pdf
Step 12 The task is complete when the quota can be verified. Take a.pdf
FOREVERPRODUCTCHD
 
QUESTIONDiscuss how has Web 2.0 changed the behavior of Internet .pdf
QUESTIONDiscuss how has Web 2.0 changed the behavior of Internet .pdfQUESTIONDiscuss how has Web 2.0 changed the behavior of Internet .pdf
QUESTIONDiscuss how has Web 2.0 changed the behavior of Internet .pdf
FOREVERPRODUCTCHD
 
Python program with functions that extracts specific characters from.pdf
Python program with functions that extracts specific characters from.pdfPython program with functions that extracts specific characters from.pdf
Python program with functions that extracts specific characters from.pdf
FOREVERPRODUCTCHD
 
Please answer the following question and all its parts. Please exp.pdf
Please answer the following question and all its parts. Please exp.pdfPlease answer the following question and all its parts. Please exp.pdf
Please answer the following question and all its parts. Please exp.pdf
FOREVERPRODUCTCHD
 
Please help, I cant figure out what I did wrong. Problem 11-2A (Pa.pdf
Please help, I cant figure out what I did wrong. Problem 11-2A (Pa.pdfPlease help, I cant figure out what I did wrong. Problem 11-2A (Pa.pdf
Please help, I cant figure out what I did wrong. Problem 11-2A (Pa.pdf
FOREVERPRODUCTCHD
 
Know the different types of viruses which have a dsRNA genome A type.pdf
Know the different types of viruses which have a dsRNA genome  A type.pdfKnow the different types of viruses which have a dsRNA genome  A type.pdf
Know the different types of viruses which have a dsRNA genome A type.pdf
FOREVERPRODUCTCHD
 
In what ways do the experts foresee the use of both virtualization a.pdf
In what ways do the experts foresee the use of both virtualization a.pdfIn what ways do the experts foresee the use of both virtualization a.pdf
In what ways do the experts foresee the use of both virtualization a.pdf
FOREVERPRODUCTCHD
 
In the Meselson Stahl experiment, E. coli was grown for many generati.pdf
In the Meselson Stahl experiment, E. coli was grown for many generati.pdfIn the Meselson Stahl experiment, E. coli was grown for many generati.pdf
In the Meselson Stahl experiment, E. coli was grown for many generati.pdf
FOREVERPRODUCTCHD
 
implement the ListLinked ADT (the declaration is given in ListLinked.pdf
implement the ListLinked ADT (the declaration is given in ListLinked.pdfimplement the ListLinked ADT (the declaration is given in ListLinked.pdf
implement the ListLinked ADT (the declaration is given in ListLinked.pdf
FOREVERPRODUCTCHD
 

More from FOREVERPRODUCTCHD (20)

You are asked with writing a program in C that manages contact infor.pdf
You are asked with writing a program in C that manages contact infor.pdfYou are asked with writing a program in C that manages contact infor.pdf
You are asked with writing a program in C that manages contact infor.pdf
 
Write a short paragraph explaining what the exploit does in Assembly.pdf
Write a short paragraph explaining what the exploit does in Assembly.pdfWrite a short paragraph explaining what the exploit does in Assembly.pdf
Write a short paragraph explaining what the exploit does in Assembly.pdf
 
Write a program to convert a given INFIX into POSTFIX. Make sure .pdf
Write a program to convert a given INFIX into POSTFIX. Make sure .pdfWrite a program to convert a given INFIX into POSTFIX. Make sure .pdf
Write a program to convert a given INFIX into POSTFIX. Make sure .pdf
 
What quality control mechanisms should major accounting firms have i.pdf
What quality control mechanisms should major accounting firms have i.pdfWhat quality control mechanisms should major accounting firms have i.pdf
What quality control mechanisms should major accounting firms have i.pdf
 
What are three basic ethical principles for journalism Why are ethi.pdf
What are three basic ethical principles for journalism Why are ethi.pdfWhat are three basic ethical principles for journalism Why are ethi.pdf
What are three basic ethical principles for journalism Why are ethi.pdf
 
What are some of the different versions of UNIX® Why is it importan.pdf
What are some of the different versions of UNIX® Why is it importan.pdfWhat are some of the different versions of UNIX® Why is it importan.pdf
What are some of the different versions of UNIX® Why is it importan.pdf
 
Type in your own words In details, discuss the following questions.pdf
Type in your own words In details, discuss the following questions.pdfType in your own words In details, discuss the following questions.pdf
Type in your own words In details, discuss the following questions.pdf
 
Twice a first number decreased by a second number is 11. The first nu.pdf
Twice a first number decreased by a second number is 11. The first nu.pdfTwice a first number decreased by a second number is 11. The first nu.pdf
Twice a first number decreased by a second number is 11. The first nu.pdf
 
the largest drum ever constructed was played at the Rotal festival H.pdf
the largest drum ever constructed was played at the Rotal festival H.pdfthe largest drum ever constructed was played at the Rotal festival H.pdf
the largest drum ever constructed was played at the Rotal festival H.pdf
 
Suppose that the material that you are recrystallizing fails to perc.pdf
Suppose that the material that you are recrystallizing fails to perc.pdfSuppose that the material that you are recrystallizing fails to perc.pdf
Suppose that the material that you are recrystallizing fails to perc.pdf
 
SOS Please please please help on this problem!!!!!!!!!!!!!!!!!!!!!! .pdf
SOS Please please please help on this problem!!!!!!!!!!!!!!!!!!!!!! .pdfSOS Please please please help on this problem!!!!!!!!!!!!!!!!!!!!!! .pdf
SOS Please please please help on this problem!!!!!!!!!!!!!!!!!!!!!! .pdf
 
Step 12 The task is complete when the quota can be verified. Take a.pdf
Step 12  The task is complete when the quota can be verified.  Take a.pdfStep 12  The task is complete when the quota can be verified.  Take a.pdf
Step 12 The task is complete when the quota can be verified. Take a.pdf
 
QUESTIONDiscuss how has Web 2.0 changed the behavior of Internet .pdf
QUESTIONDiscuss how has Web 2.0 changed the behavior of Internet .pdfQUESTIONDiscuss how has Web 2.0 changed the behavior of Internet .pdf
QUESTIONDiscuss how has Web 2.0 changed the behavior of Internet .pdf
 
Python program with functions that extracts specific characters from.pdf
Python program with functions that extracts specific characters from.pdfPython program with functions that extracts specific characters from.pdf
Python program with functions that extracts specific characters from.pdf
 
Please answer the following question and all its parts. Please exp.pdf
Please answer the following question and all its parts. Please exp.pdfPlease answer the following question and all its parts. Please exp.pdf
Please answer the following question and all its parts. Please exp.pdf
 
Please help, I cant figure out what I did wrong. Problem 11-2A (Pa.pdf
Please help, I cant figure out what I did wrong. Problem 11-2A (Pa.pdfPlease help, I cant figure out what I did wrong. Problem 11-2A (Pa.pdf
Please help, I cant figure out what I did wrong. Problem 11-2A (Pa.pdf
 
Know the different types of viruses which have a dsRNA genome A type.pdf
Know the different types of viruses which have a dsRNA genome  A type.pdfKnow the different types of viruses which have a dsRNA genome  A type.pdf
Know the different types of viruses which have a dsRNA genome A type.pdf
 
In what ways do the experts foresee the use of both virtualization a.pdf
In what ways do the experts foresee the use of both virtualization a.pdfIn what ways do the experts foresee the use of both virtualization a.pdf
In what ways do the experts foresee the use of both virtualization a.pdf
 
In the Meselson Stahl experiment, E. coli was grown for many generati.pdf
In the Meselson Stahl experiment, E. coli was grown for many generati.pdfIn the Meselson Stahl experiment, E. coli was grown for many generati.pdf
In the Meselson Stahl experiment, E. coli was grown for many generati.pdf
 
implement the ListLinked ADT (the declaration is given in ListLinked.pdf
implement the ListLinked ADT (the declaration is given in ListLinked.pdfimplement the ListLinked ADT (the declaration is given in ListLinked.pdf
implement the ListLinked ADT (the declaration is given in ListLinked.pdf
 

Recently uploaded

How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 

Recently uploaded (20)

How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 

Summarize the purpose of a WAN and define what makes up a WAN connec.pdf

  • 1. Summarize the purpose of a WAN and define what makes up a WAN connection. Detail the types of devices used to establish and maintain a WAN connection and list some of the more common WAN connection methods. Discuss the differences between WAN and LAN connections, and who is responsible for providing WAN connections. Discuss how a modem handles digital information over analog signals. Describe how to configure and setup remote access protocols. What factors need careful consideration? Solution Remote Access Protocols Remote access protocols square measure accustomed management the institution of connections and therefore the transmission of information over WAN links. 3 varieties of remote access protocols square measure supported by Windows Server 2003 remote access: Point-to-Point Protocol (PPP): AN industry-standard set of protocols providing the most effective security, multi-protocol support and ability. Serial Line net Protocol (SLIP): employed by older remote access servers. A Windows Server 2003 RAS server doesn't support SLIP dial-up connections. Microsoft remote access protocol: additionally called Asynchronous NetBEUI (AsyBEUI) and is employed by inheritance remote access purchasers, like Windows NT three.1, Windows for Workgroups, DOS and computer network Manager purchasers. LAN may be a electronic network that connects computers in tiny areas. WAN may be a network that covers a broad space victimization personal or public network transports. The terms {lan|local square measurea network|LAN|computer network} and WAN are usually confusing for those that aren’t that school savvy. These square measure each connections that permit users to attach their laptop to a network, as well as the web. computer network is brief for native space Network, whereas WAN is brief for Wide space Network. These 2 disagree from one another in distinct ways that. computer network may be a electronic network that connects computers in tiny areas like home, office, school, corporation, etc. employing a network media. it's helpful for sharing resources like printers, files, games, etc. A computer network network includes a few of laptop systems connected to every alternative, with one system connected to a router, electronic equipment or AN outlet for net access. The computer network network is made victimization cheap technologies like local area network cables, network adapters and hubs. However, alternative wireless technologies are obtainable to attach the pc through a wireless
  • 2. access. so as to put together a computer network network, an individual might also need specialised software system software system. the foremost widespread software system includes the Microsoft Windows’ net affiliation Sharing (ICS), that permits users to make computer network. distinction between computer network and WAN Key Difference: computer network may be a electronic network that connects computers in tiny areas. WAN may be a network that covers a broad space victimization personal or public network transports. The terms {lan|local square measurea network|LAN|computer network} and WAN are usually confusing for those that aren’t that school savvy. These square measure each connections that permit users to attach their laptop to a network, as well as the web. computer network is brief for native space Network, whereas WAN is brief for Wide space Network. These 2 disagree from one another in distinct ways that. LAN may be a electronic network that connects computers in tiny areas like home, office, school, corporation, etc. employing a network media. it's helpful for sharing resources like printers, files, games, etc. A computer network network includes a few of laptop systems connected to every alternative, with one system connected to a router, electronic equipment or AN outlet for net access. The computer network network is made victimization cheap technologies like local area network cables, network adapters and hubs. However, alternative wireless technologies are obtainable to attach the pc through a wireless access. so as to put together a computer network network, an individual might also need specialised software system software system. the foremost widespread software system includes the Microsoft Windows’ net affiliation Sharing (ICS), that permits users to make computer network. The first thriving computer network network was created by Cambridge in 1974 called the Cambridge Ring; but it had been not commercial till 1976 by Datapoint Corporation. Datapoint’s ARCNET was put in at Chase Manhattan Bank in big apple in 1977. the most purpose of making a computer network was to share storage and alternative technologies like printers, scanners, etc. the tiniest computer network will embody 2 computers, whereas the biggest will, in theory, support sixteen million devices per regarding.com. Wikipedia states that “the larger LANs square measure characterised by their use of redundant links with switches victimization the spanning tree protocol to forestall loops, their ability to manage differing traffic varieties via quality of service (QoS), and to segregate traffic with VLANs.” The larger LANs additionally use alternative devices like switches, firewalls, routers, load balancers, and sensors. An analog-digital converter, or ADC because it is a lot of unremarkably referred to as, may be a device that converts analog signals into digital signals. Analog data is transmitted by modulating a continual transmission signal by amplifying a signal's strength or variable its frequency to feature or deduct knowledge. Digital data describes any system supported discontinuous
  • 3. knowledge or events. Computers, that handle knowledge in digital kind, need analog-to-digital converters to show signals from analog to digital before it are often scan. One example may be a electronic equipment that turns signals from digital to analog before sending those signals over communication lines like phonephone lines that carry solely analog signals. The signals square measure turned back to digital kind (demodulated) at the receiving finish so the pc will method the information in its digital format. ATM Cable electronic equipment Dial-up DSL ISDN Leased line SONET X.25 SD-WAN