Whitepaper Library > Technology > Networking > Local Area Networking

Local Area Networking

A Local Area Network (LAN) is a computer network covering a local area, like a home, office, or group of buildings. Current LANs are most likely to be based on switched IEEE 802.3 Ethernet running at 10, 100 or 1,000 Mbit/s or on Wi-Fi technology . The defining characteristics of LANs in contrast to WANs are: their much higher data rates; smaller geographic range; and that they do not require leased telecommunication lines.
Results 76 - 89 of 89Sort Results By: Published Date | Title | Company Name
White Paper Published By: Gartner, Inc     Published Date: Oct 28, 2010
New technologies emerge every day, but not all of them pay off, and adopting them too early might be risky for your organization.
Tags : 
emerging trends, emerging technologies, hype cycle, new technologies, it trends
Gartner, Inc
White Paper Published By: xmannnnn     Published Date: Aug 06, 2010
Ultra High Speed Internet, TV and local/long distance phone services combined into 1 superior service.
Tags : 
active directory, bandwidth management, convergence, distributed computing, ethernet networking
White Paper Published By: Korenix Technology     Published Date: Aug 03, 2010
This white paper describes the surveillance video multicasting technology, highlights the benefits of IGMP as well as its integration in Korenix devices for assuring high quality video communication in surveillance applications.
Tags : 
igmp, igmp snooping, igmp query, ip surveillance, video surveillance
Korenix Technology
White Paper Published By: Webfishery     Published Date: Aug 03, 2010
This white paper explains how businesses can develop effective strategies to improve efficiency and reduce networking and application costs.
Tags : 
application management, white paper, bandwidth management, ethernet networking, gigabit networking
White Paper Published By: Identity Engines     Published Date: Mar 24, 2008
Guests, contractors, vendors, business partners, and other temporary users require and expect certain level of network access within organizations that they visit. Corporate network access has been typically open; internal LAN connections have seldom required authentication. Today however, regulatory and other security concerns demand that organizations adopt a more secure posture towards these short-term users.
Tags : 
idengines, id engines, identity engines, access control, authentication
Identity Engines
White Paper Published By: TamoSoft     Published Date: Sep 28, 2007
This white paper examines the problems related to the deployment and usage of software-based network monitoring solutions, methods of achieving network traffic visibility in various network configurations that include hubs, switches, routers, etc.
Tags : 
monitoring, lan, wan, best practices, networking
White Paper Published By: Nevis Networks     Published Date: Sep 04, 2007
While 802.1X has a growing presence, it's still immature and may not provide all the policy enforcement features commonly required in most organizations. This white paper focuses on the 802.1X standard for authentication and access control and how it compares to the Nevis approach for LAN security.
Tags : 
security policies, policy management, authentication, access control, lan
Nevis Networks
White Paper Published By: Nevis Networks     Published Date: Sep 04, 2007
The ability to monitor, track and report usage based on actual user identity and applications provides for quicker reaction time, easier reporting for compliance, as well as more visibility into the network. Learn about a complete line of solutions for effective identity-based policy enforcement.
Tags : 
lan, lan security, network security, security policies, security policy
Nevis Networks
White Paper Published By: Nevis Networks     Published Date: Sep 04, 2007
Companies are yearning for a solution to guard their network from security risks such as external or untrusted users, and unmanaged endpoints on their internal LAN. NAC technology works well, but a strategic solution is required to fully address the problem of the dissolving network perimeter.
Tags : 
lan, local area networking, nac, access control, network security
Nevis Networks
White Paper Published By: Ingate Systems     Published Date: May 31, 2007
Session Initiation Protocol (SIP) represents the third wave of Internet usage after SMTP (email) and HTTP (Web). Download this free guide now and learn why all firewalls will need to be SIP capable in order to support the wide-scale deployment of enterprise person-to-person communications.
Tags : 
communication, communications, voip, voice over ip, lan
Ingate Systems
White Paper Published By: Neterion     Published Date: Dec 05, 2006
Virtualization is a key strategy for simplifying deployment of IT resources and maximizing their utilization. Specifically, virtualization refers to the concept of abstracting physical resources such as compute cycles, data storage, and network bandwidth, and then provisioning and sharing these resources amongst multiple applications.
Tags : 
virtualization, data center, data centers, datacenters, resource management
White Paper Published By: NetIQ Corporation     Published Date: Nov 18, 2006
This white paper is a must read for those involved in the process of log management for legal use. You'll examine the admissibility of log data in court cases; maintaining the authenticity of log data; and how log data can be attacked and stand up to scrutiny. And, learn legal terms like Hearsay, Best Evident Rules, etc.
Tags : 
log file, data protection, log management, legal log, log data
NetIQ Corporation
White Paper Published By: Opalis     Published Date: Nov 06, 2006
This white paper describes how automating IT processes greatly reduces operational costs and improves service delivery. Learn how to standardize best practices and integrate data center and operations tools without the management burden associated with scripts and home-grown programs.
Tags : 
automation, business process automation, bpa, process automation, data centers
White Paper Published By: Trusted Network Tech     Published Date: Nov 06, 2006
This paper addresses several issues organizations should consider when analyzing the efficacy and costs of NAC solutions and looks at a complementary alternative technology based on TNT’s Identity™, which helps address and overcome some limitations of NAC solutions.
Tags : 
access control, nac, network, identity management, network access control
Trusted Network Tech
Start   Previous    1 2 3 4     Next   End
Search Whitepaper Library      

Add Whitepapers

Get your company's whitepapers in the hands of targeted business professionals.