Free Essay

Checkpoint - Lan Operating Systems Scenarios

In:

Submitted By masonh4206
Words 369
Pages 2
LAN – Is a network system that has a main computer (server) and other computers connected to that computer so all computers within the network can share files and an internet connection.

WAN – A WAN network is a network that covers a large area, within this type of network two or more locations can be covered within this type of network an example is a location in San Diego CA and a location in Dallas TX.

MAN – A MAN network is a network that encompasses a small to a large group of networks within buildings that can cover a small area to a large area such as a University campus.

Client/Server – A client server system is a network that has one server that has multiple computer that connect to that server to share connections and information.

Peer-to-Peer – The Peer-to-Peer network is a network that enables a computer to obtain information/files, movies music or any other type of media from multiple computers by retrieving pieces of data from these computers rather than accessing all of the information from one central computer/location.

Hub – Is a device that is used to connect multiple computers so they work together as a single unit enabling the computers to share information at the physical layer.

Spoke - A spoke network is similar to a hub network but the spoke network if viewed as a layout would look like a bicycle tire spoke where the information that is transmitted is sent from point to point until it reaches the computer it is destined for.

Mesh – A network that enables connections to be transmitted from computers at points without a hub. It allows a connections to be transmitted even if one connection were to stop working.

Star - A star network is similar to that of a hub and spoke having a centralized hub, but if that hub stops working then all computers in that network will no longer have connection to each other.

Bus – A bus network uses one coaxial cable to connect the computers connected in this network. All computers connected in this network cannot share information at the same time only one computer can transmit data at a time.

Similar Documents

Premium Essay

It240

...|[pic] |Syllabus | | |College of Information Systems & Technology | | |IT/240 Version 4 | | |Intro to LAN Technologies | Copyright © 2012, 2009, 2007 by University of Phoenix. All rights reserved. Course Description This foundational course covers local area network topics including rationale for networking, the open systems interconnection (OSI) model, common network topologies and architecture, client/server concepts, basic hardware devices and usage, and basic networking security concepts. Policies Faculty and students will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you...

Words: 2355 - Pages: 10

Premium Essay

Nt2640

...March 2013 Table of Contents COURSE OVERVIEW 5 Catalog Description 5 Goals and Expectations 5 Learning Objectives and Outcomes 6 Career Impact 6 INSTRUCTIONAL RESOURCES 7 Required Resources 7 Additional Resources 7 COURSE MANAGEMENT 9 Technical Requirements 9 Test Administration and Processing 9 Replacement of Learning Assignments 10 Communication and Student Support 10 Academic Integrity 10 GRADING 11 COURSE DELIVERY 13 Instructional Approach 13 Methodology 13 Facilitation Strategies 14 UNIT PLANS 15 Unit 1: The TCP/IP Model, LANs, WANs, and IP Networks 15 Unit 2: TCP/IP Network, Transport, and Application Layers 24 Unit 3: IP Subnetting and Basic Router Configuration 34 Unit 4: IP Routing with Connected, Static, and RIP-2 Routes 44 Unit 5: IP Troubleshooting and EIGRP 53 Unit 6: Subnet Design 62 Unit 7: Advanced IP Routing Topics and OSPF 69 Unit 8: Advanced IP Topics 79 Unit 9: LANs 88 Unit 10: WANs 98 Unit 11: Course Review and Final Examination 107 COURSE SUPPORT...

Words: 22068 - Pages: 89

Premium Essay

Unit 1 Assignment 1: Effects of Routing on Current Communication Methods Used by Organizations

...Graded Assignments The following sections contain student copies of the assignments. These must be distributed to students prior to the due dates for the assignments. Online students will have access to these documents in PDF format, which will be available for downloading at any time during the course. Course Revision Table Change Date | Updated Section | Change Description | Change Rationale | Implementation Quarter | 11/04/2011 | All | New Curriculum | | December 2011 | | | | | | | | | | | | | | | | | | | | | | | | | | ------------------------------------------------- Graded Discussion/Assignment Requirements Discussion or Assignment Requirements documents provided below must be printed and distributed to students for guidance on completing the discussions and assignments and submitting them for grading. Instructors must remind students to retain all handouts and assignment documents issued in every unit, as well as student-prepared documentation and graded deliverables. Some or all these documents will be used repeatedly across different units. Unit 1 Assignment 1: Effects of Routing on Current Communication Methods Used by Organizations Learning Objectives and Outcomes * Explore the effects of routing on current communication methods used by organizations. Assignment Requirements The Johnson Company provides networking components and services. It sounds simple, but management knows it takes a lot of planning...

Words: 3601 - Pages: 15

Premium Essay

Upgrade Internet Edge

...Technical Writing Project Cover Sheet Capstone Proposal Project Name: Upgrading ABC Inc. Internet Edge Student Name: Michael Wakefield Degree Program: Bachelor of Science IT-Security Mentor Name: Signature Block Student’s Signature Mentor’s Signature Table of Contents Capstone Proposal Summary 1 Review of Other Work 8 Rationale and Systems Analysis 16 Goals and Objectives 22 Project Deliverables 26 Project Plan and Timelines 27 References 28 Appendix 1: Competency Matrix 4 Capstone Proposal Summary Internet of Everything (IoE) and “Big Data” equates to competitive advantages to the modern business landscape. Numerous white papers are circulating on the Internet highlighting the business case supporting the IoE initiative. For instance, in a white paper conducted by Cisco Inc. on the Value Index of IoE in 2013 reported the following: In February 2013, Cisco released a study predicting that $14.4 trillion of value (net profit) will be at stake globally over the next decade, driven by connecting the unconnected –people-to-people (P2P), machine-to-people (M2P), and machine-to-machine (M2M) - via the Internet of Everything (IoE). Cisco defines the Internet of Everything as the networked connection of people, process, data, and things. The IoE creates new “capabilities, richer experiences, and unprecedented economic opportunity for businesses, individuals, and countries” (The Internet of Everything, Cisco, Inc. 2014). With such a...

Words: 5523 - Pages: 23

Free Essay

Remote Infra Management

...cent of the total addressable market for offshoring and are likely to drive the next wave of growth. . Service lines that have driven recent growth, i.e., application development and maintenance (ADM) and R&D services are already 30-35 % penetrated and are not as likely to grow dramatically”. The Remote/offshore part was easy with BPO having already paved the way for proving service delivery effectiveness from an offshore location and with the advent of sophisticated tools and technologies that enabled remote IT management the proposition was further solidified. International research firm IDC also declared that “more than 85% of infrastructure components can be managed from a central remote location. These components encompass servers/systems, databases, networks, storage, security, applications and e-business infrastructure. Through managing these components from a remote location, companies can cut down their cost of infrastructure operations and management by 40-60 %, also gaining access to expert ‘skill-on-tap’ on a 24x7 basis” For decades the global giants who had been ruling the Infrastructure Management Services (IMS) market boasted of a very rigid model of service delivery to companies; which is often termed as the ‘Traditional IT Outsourcing Model’. In the traditional outsourcing model, a third party service provider would take over the entire IT assets of an...

Words: 8368 - Pages: 34

Premium Essay

Computers

...Afzal South University ITS3103: Week 5– Assignment 2 18 March 2014 Tim Williams Professor Afzal South University Network Design Blue Print: PaintisDead.com (Vehicle Vinyl Wrapping Design Company). The company designs vehicle graphics for commercial and private vehicles and buildings. PaintisDead.com is headquarters is located in Miami, Florida (75 employees to include corporate management). Telecommunication Network Design needs to accommodate the headquarters and 5 satellite cities with at least 35 employees to include general manager in each store. Store locations are in Savannah Georgia, Fayetteville North Carolina, Richmond Virginia, Jacksonville Florida, and Dover Delaware. The company needs to have a telecommunication system that is efficient and cut down on business trips between all the stores to include the headquarters. Video conferencing, VoiP, push to talk cell phones for sales and design, computer network to protect design ideas when they are being transferred to other stores or when accessed on the server. * Does the client already have an established network and do they want to improve on it? Update vs. full network installation. * Does the client have a network? * What is the client’s budget? * What are the clients plans for growth? (Scalability of network to accommodate the rise in business 5yr vs. 10yr. * Security Considerations. * Used, non-used/free and usable IP-networks, VLANs, equipment and software versions and generally...

Words: 5175 - Pages: 21

Premium Essay

Information Security Technologies

...adding my name following the word 'Signature', I intend that this certification will have the same authority and authenticity as a document executed with my hand-written signature. Signature _____Benjamin L. Tomhave________________________ Benjamin L. Tomhave 12/7/2004 1 Research Paper: Information Security Technologies by Benjamin L. Tomhave Abstract The following research paper provides analysis of thirteen (13) information security technology topics, arranged in ten (10) groups, that are either commonly found or emerging within the information security industry. These topics include: Access Control Management, Antivirus, Audit Data Reduction, Firewalls, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Anomaly Detection Systems (ADS), Event Correlation Systems (ECS), Network Mapping, Password Cracking, Public Key Infrastructure, Virtual...

Words: 12903 - Pages: 52

Premium Essay

Mis 395 Reticent Intelligent Enterprise Paper

...MIS 395 Management Information Systems Project 1: Reticent Intelligence Enterprise Spring 2010 – Section 25224 11 March 2010 Group 7 Robert Nunn Kelsea Herzog Stephanie Scott Jenny Hernandez Henry Michaels Reticent Intelligence Enterprises is a new company located in Wichita, KS, that designs, manufactures and sells advanced espionage weapons and spy equipment. Much like the name of the organization states, the firm remains reticent by staying silent to the general audience and choosing to target their products to federal, state and local governments. It currently employs 52 people not including the factory workers. Reticent Intelligence Enterprise employees’ work in a variety of departments including shipping, manufacturing, selling, and designing of advanced espionage tactical weapons and spy equipment. Our company is responsible for providing the most technologically-advanced weapons and spy equipment for government agencies in order to provide maximum efficiency and effectiveness in the aid of capturing criminals and terrorists. The weapons and equipment in our company include and are not limited to tactical camouflage suits, long and short-range rifles, tracking devices, and a wide range of other gadgets. The headquarters and manufacturing plant of Reticent Intelligence Enterprises are located in Wichita, Kansas. The company recently purchased an abandoned warehouse located in the Central Business District in order to supply and distribute its products...

Words: 3964 - Pages: 16

Premium Essay

Information Technology Cma

...Information Technology Page 2 of 103 © CMA Ontario, 2011 Information Technology .................................................... Error! Bookmark not defined. 1 Foreword ....................................................................................................................... 4 2 Introduction ................................................................................................................... 4 3 Section 1 – The Business of IT ..................................................................................... 5 3.1 Defining Information Technology (IT) .................................................................. 5 3.2 IT Jobs & Roles ..................................................................................................... 6 3.3 Link between Corporate Strategy and IT ............................................................... 9 3.4 Organization of IT departments ........................................................................... 10 3.4.1 Additional IT Human Resources Factors ...................................................... 11 3.5 Use of Consultants ............................................................................................... 11 3.6 Outsourcing .......................................................................................................... 12 3.7 Augmenting the Technology Decision Making Process ...................................... 14 3.7.1 Technology vs. The Marketplace...

Words: 33324 - Pages: 134

Premium Essay

Transsctions and Economics

...Developmental Editor: Jennifer Thomas Editorial Assistant: Lena Mortis Sr. Marketing Manager: John Carey Marketing Coordinator: Suellen Ruttkay Marketing Specialist: Betty Jung Content Project Manager: Cliff Kallemeyn Media Editor: Deepak Kumar Sr. Art Director: Michelle Kunkler Frontlist Buyer, Manufacturing: Sandee Milewski Internal Designer: Juli Cook/ Plan-It-Publishing, Inc. Cover Designer: Rose Alcorn Cover Image: © Justin Guariglia/Corbis © 2011 South-Western, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright hereon may be reproduced or used in any form or by any means— graphic, electronic, or mechanical, including photocopying, recording, taping, Web distribution, information storage and retrieval systems, or in any other manner—except as may be permitted by the license terms herein. For product information and technology assistance, contact us at Cengage Learning Customer & Sales Support, 1-800-354-9706 For permission to use material from this text or product, submit all requests online at www.cengage.com/permissions Further permissions questions can be emailed to permissionrequest@cengage.com Library of Congress Control Number: 2009940356 ISBN-13: 978-0-538-78609-6 ISBN-10: 0-538-78609-4 South-Western Cengage Learning 5191 Natorp Boulevard Mason, OH 45040 USA Cengage...

Words: 234748 - Pages: 939

Free Essay

Cis 534 - Lab Manual

...CIS 534 - Advanced Network Security Design 1 CIS 534 Advanced Network Security Design CIS 534 - Advanced Network Security Design 2 Table of Contents Toolwire Lab 1:Analyzing IP Protocols with Wireshark ........................................................................ 6 Introduction ............................................................................................................................................. 6 Learning Objectives ................................................................................................................................ 6 Tools and Software ................................................................................................................................. 7 Deliverables ............................................................................................................................................. 7 Evaluation Criteria and Rubrics ........................................................................................................... 7 Hands-On Steps ....................................................................................................................................... 8 Part 1: Exploring Wireshark ............................................................................................................... 8 Part 2: Analyzing Wireshark Capture Information .......................................................................... 12 Lab #1 - Assessment Worksheet...

Words: 48147 - Pages: 193

Premium Essay

It Notes for Business

...ADVANCED COMPUTER APPLICATIONS MODULE DEFINE A COMPUTER * An electronic machine that works under the control of stored programs to accept, process & output data/information for use by the operator. * A device that accepts data, processes the data in accordance with a stored program, generates results, and usually consists of input, output, storage, and arithmetic, logic, and control units. * A functional unit that can perform substantial computation, including numerous arithmetic operations or logic operations, without human intervention during a run. * It is an electronic device/machine that accepts data (raw facts & figures) as input and processes (works on it) to produce information (data converted to meaningful form) as output. The computer is made up of hardware, software and peripheral devices. Hardware- refers to the tangible, physical and mechanical components of a computer. Software- refers to the intangible computer components, which are the programs or instructions of the computer. Everything that a computer does, it acts under instructions written out as computer programs. The hardware needs these instructions to function Computer program: * A set of instructions, written in a specific programming language, which a computer follows in processing data, performing an operation, or solving a logical problem. See also software. * A computer program is a set of statements or instructions to be used directly or indirectly in a computer...

Words: 59334 - Pages: 238

Premium Essay

Windows 10 Introduction

...Introducing Windows 10 for IT Professionals Technical Overview ED BOTT PUBLISHED BY Microsoft Press A Division of Microsoft Corporation One Microsoft Way Redmond, Washington 98052-6399 Copyright 2016 © Microsoft Corporation All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form or by any means without the written permission of the publisher. ISBN: 978-0-7356-9697-6 Printed and bound in the United States of America. First Printing Microsoft Press books are available through booksellers and distributors worldwide. If you need support related to this book, email Microsoft Press Support at mspinput@microsoft.com. Please tell us what you think of this book at http://aka.ms/tellpress. This book is provided “as-is” and expresses the author’s views and opinions. The views, opinions and information expressed in this book, including URL and other Internet website references, may change without notice. Some examples depicted herein are provided for illustration only and are fictitious. No real association or connection is intended or should be inferred. Microsoft and the trademarks listed at http://www.microsoft.com/about/legal/en/us/IntellectualProperty/ Trademarks/EN-US.aspx are trademarks of the Microsoft group of companies. All other marks are property of their respective owners. Acquisitions Editor: Rosemary Caperton Project Editor: Christian Holdener; S4Carlisle Publishing Services Editorial Production:...

Words: 48336 - Pages: 194

Premium Essay

Information and Survey Analysis

...1. An IS auditor is reviewing access to an application to determine whether the 10 most recent "new user" forms were correctly authorized. This is an example of: A. variable sampling. B. substantive testing. C. compliance testing. D. stop-or-go sampling. The correct answer is: C. compliance testing. Explanation: Compliance testing determines whether controls are being applied in compliance with policy. This includes tests to determine whether new accounts were appropriately authorized. Variable sampling is used to estimate numerical values, such as dollar values. Substantive testing substantiates the integrity of actual processing, such as balances on financial statements. The development of substantive tests is often dependent on the outcome of compliance tests. If compliance tests indicate that there are adequate internal controls, then substantive tests can be minimized. Stop-or-go sampling allows a test to be stopped as early as possible and is not appropriate for checking whether procedures have been followed. 2. The decisions and actions of an IS auditor are MOST likely to affect which of the following risks? A. Inherent B. Detection C. Control D. Business The correct answer is: B. Detection Explanation: Detection risks are directly affected by the auditor's selection of audit procedures and techniques. Inherent risks usually are not affected by the IS auditor. Control risks are controlled by the actions of the company's management. Business...

Words: 97238 - Pages: 389

Premium Essay

Beacuse I Have to

...State of North Carolina Statewide Information Security Manual Prepared by the Enterprise Security and Risk Management Office Publication Date: April 20, 2012 INTRODUCTION FOR STATEWIDE INFORMATION SECURITY MANUAL ...... 1 GUIDANCE FOR AGENCIES .............................................................................. 1 CHAPTER 1 – CLASSIFYING INFORMATION AND DATA ................................ 2 CHAPTER 2 – CONTROLLING ACCESS TO INFORMATION AND SYSTEMS. 7 CHAPTER 3 – PROCESSING INFORMATION AND DOCUMENTS ................. 32 CHAPTER 4 – PURCHASING AND MAINTAINING COMMERCIAL SOFTWARE ..................................................................................................... 107 CHAPTER 5 – SECURING HARDWARE, PERIPHERALS AND OTHER EQUIPMENT .................................................................................................... 122 CHAPTER 6 – COMBATING CYBER CRIME ................................................. 146 CHAPTER 7 – CONTROLLING E-COMMERCE INFORMATION SECURITY 153 CHAPTER 9 – DEALING WITH PREMISES RELATED CONSIDERATIONS . 173 CHAPTER 10 – ADDRESSING PERSONNEL ISSUES RELATING TO SECURITY ........................................................................................................ 185 CHAPTER 11 – DELIVERING TRAINING AND STAFF AWARENESS .......... 192 CHAPTER 12 – COMPLYING WITH LEGAL AND POLICY REQUIREMENTS ......................................................................................................................

Words: 65255 - Pages: 262