Premium Essay

How to Set Up a Lan

In:

Submitted By dutton614
Words 546
Pages 3
How to set up a LAN
How to set up a LAN 1. Assess your needs in a network. The devices you use to set your network up will determine your network's capabilities. You should address your needs in terms of cost, security, connection speed, expandability (adding more computers or devices later) and distance between computers. In general, you will need to keep all the computers in the network within 100 yards (91 m) of each other. 2. Ensure that your computers have wireless networking cards installed. In order to communicate wirelessly with other computers in the network, each computer must have a wireless networking card. If your computers are only a few years old, you are almost guaranteed to already have one built-in, as this is a standard feature on all computers being produced today. If you have an older computer, you may need to purchase and install a networking card. 3. Set up an Internet connection. While L.A.N.s can be set up simply to share files between computers without Internet connectivity, there is little benefit to doing so considering the cost of wiring the entire network. To share an Internet connection between computers, you will first need a broadband Internet connection (such as cable or DSL) set up for your primary computer. Contact a local Internet service provider (ISP) to establish a connection if you don't already have one. 4. Purchase a wireless router. You will need to broadcast your Internet connection wirelessly, and for this, you need a router. When buying a router, make sure you get one that is designed for your connection type (cable, DSL, etc.). You should also consider the strength of the router's signal. The packaging will describe how far you can expect the router's signal to broadcast. It will need to reach every computer in your network. 5. Install the router. To install the router, run your main Ethernet cable

Similar Documents

Premium Essay

Nt1310 Unit 3 Assignment 1 Networking Components

...and stops sending data. Networking Components When creating a LAN network, there are many different components that are used, what components are used depends on the task that the LAN is setup for. A central hub would be used in larger LAN networks to join separate LAN’s together. When the hub receives a packet, it is then broadcast out to all of the connected devices. This may cause security issues as although each packet is closed with an address on it of the correct device, therefore it will be discarded by any other devices, if a user wanted to, they could capture the packet and open it on the wrong device, and no one would be able to tell. Because of this, a hub is often considered a dumb network...

Words: 610 - Pages: 3

Premium Essay

Unit 1 Assignment 2

...Investments location, this report will address which IT set-up domains are affected by the standard and how. The first IT set-up affected by core use is the User Domain. The User Domain describes the people who access an organization’s information system. The user domain will enforce an Acceptable Use Policy (AUP) that defines what each user can and cannot do with the company’s data. With company users, any outsiders, contractor’s or third party agents will also need to agree and comply with the Acceptable Use Policy. Any violation will be taken up with management or the proper establishments to access further corrective action. Work Station Domain: This is where most of the company’s users connect to get to the IT set-up. No personal devices or removable media may be allowed on this network ever. All devices and removable media will be issued by the company for official work use. Access Control Lists (ACLs): ACLs will be tired up to appropriately define which access the users are allowed to use. Any violation causes an immediate suspension of rights and the person(s) in violation will be subject to company management’s choices and or the proper experts will be called. LAN Domain: A LAN Domain is a collection of computers that are solid to one another. Data closets and physical elements of the LAN, and reasonable elements are to be selected by authorized personnel. This requires strong security & access controls. The LAN Domain can access company wide systems, allowing access...

Words: 413 - Pages: 2

Premium Essay

Unit 1 Assignment 2

...Investments location, this report will address which IT set-up domains are affected by the standard and how. The first IT set-up affected by core use is the User Domain. The User Domain describes the people who access an organization’s information system. The user domain will enforce an Acceptable Use Policy (AUP) that defines what each user can and cannot do with the company’s data. With company users, any outsiders, contractor’s or third party agents will also need to agree and comply with the Acceptable Use Policy. Any violation will be taken up with management or the proper establishments to access further corrective action. Work Station Domain: This is where most of the company’s users connect to get to the IT set-up. No personal devices or removable media may be allowed on this network ever. All devices and removable media will be issued by the company for official work use. Access Control Lists (ACLs): ACLs will be tired up to appropriately define which access the users are allowed to use. Any violation causes an immediate suspension of rights and the person(s) in violation will be subject to company management’s choices and or the proper experts will be called. LAN Domain: A LAN Domain is a collection of computers that are solid to one another. Data closets and physical elements of the LAN, and reasonable elements are to be selected by authorized personnel. This requires strong security & access controls. The LAN Domain can access company wide systems, allowing access...

Words: 414 - Pages: 2

Premium Essay

Introduction to Networking

...the following is true about the distance limitations in this LAN? c. All Ethernet user devices can be up to 100 meters away. (but no farther), while WLAN devices can typically be farther away than 100 meters. 2. Which of the following answers matches a particular standard to its maximum bit rate? a. 802.11g: 54 Mbps 3. Which of the following answers list a condition that could have affected the speeds that the engineer observed when testing the WLAN? b. The current radio noise d. The distance between the client device and the AP 4. Which of the following statements are true when comparing the wired and wireless LANs on this floor? b. The wireless LAN has a larger capacity d. A single transmission from the AP to a WLAN user device goes faster than the transmission from the Ethernet switch to a wired user device. 5. Which of the following answers describes the most accurate method the engineer can use to determine the coverage area? a. Do a wireless site survey. 6. Which of the following plays the biggest role in testing and certifying products to prove that they work with other products that have already been certified? c. Wi-Fi Alliance 7. Which of the following answers define a wireless LAN physical layer standard that was originally ratified by the IEEE before the year 2000? a. 802.11a b. 802.11.b 8. Which of the following locations is the least likely place to find a wireless LAN? b. As a link between two Ethernet switches on two different...

Words: 915 - Pages: 4

Premium Essay

Convert Router to Acces Point

...How To Convert a Wireless Router into an Access Point Linksys WRT54G Step 1: Connect a computer that is set to obtain its IP address information automatically to a LAN port on the wireless router that you want to convert to an AP. If you don't know how to do this, Figure 1 shows the applicable Windows XP screens. (Get to the Network Connections window by Start > Settings > Network Connections.) [pic] [pic] Figure 1: Checking for "Obtain an IP address automatically" Log into the admin page of the wireless router that you want to convert to an access point. From here on, I'll call this the "AP". Step 2: For simple, one segment LANs, there must be only one DHCP server. Your LAN's router has a DHCP server and you don't want the two to conflict. So turn off the DHCP server on the AP. In Figure 2, you can see that the DHCP server in the WRT54G AP has been disabled. [pic] Figure 2: Shut off the DHCP server; change the IP Step 3: Find your LAN Router's DHCP server range. Figure 3 shows the Basic Network Settings page of the D-Link DGL-4300 that is my LAN's router. This is where the DHCP server controls happen to be. Different routers might have the DHCP server controls on a separate page, so you may have to poke around a little. [pic] Figure 3: LAN router settings The 4300 normally has its Router IP Address set to 192.168.0.1 by default. But you can see in Figure 3, I changed it to 10.168.3.254. This shifted the DHCP server to the 10.168.3.X subnet instead of...

Words: 643 - Pages: 3

Free Essay

Itsy 1425

...single machine means only the loss of access to the resources on that one machine, the others would continue to function. Any user can share resources on his or her computer with any other user’s computer, and each user can determine what level of access other users have to his or her shared resources. Each user in this group must act as the administrator of his or her computer’s resources. Each user would also have to remember each set of credentials, which can be confusing if they aren’t trained properly in creating secure passwords, which is where efficient training on my part to help them to understand how to create secure passwords, why they’re created and the consequences of not using them properly. Because the company wants to spend as little money as possible the challenge with security will be a huge task. The key is training the personnel on security measures and making sure they understand the consequences of their actions for the company if they choose not to follow them. Ensuring they also know and understand why they need to back up their work and data on a regular basis, install patches as...

Words: 709 - Pages: 3

Premium Essay

Mis Networking Questions

...communication but can also be used for digital. The twisted wires used in today’s LANs, such as CAT5, can obtain speeds up to 1 Gbps but is limited to a maximum run of 100 meters. Coaxial cable consists of thickly insulated copper wire that can transmit a larger volume of data than that of twisted wire. Coax was used in early LANs and is still used for longer runs on larger buildings. Coax has a maximum speed of up to 1 Gbps. Fiber-optic cable has bound strands of clear glass fiber – each one the thickness of human hair. Data is transformed into pulses of light that are then sent through the cable by a laser device at rates varying from 500 Kbps to several trillion bits per second. Fiber-optic is considerably faster, lighter, and durable that wire media and well suited to systems requiring transfers of large volumes of data. But it is more expensive and harder to install than other physical media. Define a LAN, and describe its components and the functions of each component. LAN is a local area networks connect PCs and other digital devices together within a 500-meter radius and used for many corporate computing tasks. LANs typically connect a few computers in a small office, all of the computers in one building, or all of the computers in several buildings in close proximity. LANs are also used to link long-distance Wide Area Networks (WANs) and other networks around the world. One computer in a LAN is a dedicated file server which provides users with access to shared computing...

Words: 1021 - Pages: 5

Free Essay

Company Infrastructure

...Abstract There are certain benefits in having a well set up and thought out infrastructure within a company. However when setting up an infrastructure or changing an existing infrastructure there are a number of things a company should conceder in order to end up with the infrastructure that best works for them and their company. Business infrastructures usually consist of booth LAN and WAN area networks. Businesses will use a LAN to connect network devices over a short distance, such as an office building or school. Occasionally one building will contain a few small LANs, and sometimes a LAN will span a group of nearby buildings. LANs are usually owned, controlled, and managed by a single person or organization. It’s also much easier and more efficient to manage multiple computers from a single platform than it is to manage each of them individually (Kichu, NA). Servers designed to support a LAN network are usually optimized for better performance and can increase application and data availability, ultimately leading to more productive employees. Also data backups done over a LAN network can be centrally managed and scheduled, which makes them more reliable, and also allows them to be saved to an off-site location (Mitchell, 2012). LAN’s also help reduced operating costs by allowing employees to share office equipment, like printers, faxes, and storage devices. Basically, a company can buy just one or two shared printers for the entire office to...

Words: 750 - Pages: 3

Free Essay

Wireless Lan Security

...SEMINAR REPORT ON WIRELESS LAN SECURITY Contents: I. Introduction…………………………………………………………………1 II. Wireless LAN Deployment……………………………………………7 III. Wireless LAN Security Overview…………………………………10 IV. Protecting Wireless LANs…………………………………………...13 V. Wireless LAN Security Summary……………………………………18 I. Introduction a. The 802.11 Wireless LAN Standard In 1997, the IEEE ratified the 802.11 Wireless LAN standards, establishing a global standard for implementing and deploying Wireless LANS. The throughput for 802.11 is 2Mbps, which was well below the IEEE 802.3 Ethernet counterpart. Late in 1999, the IEEE ratified the 802.11b standard extension, which raised the throughput to 11 Mbps, making this extension more comparable to the wired equivalent. The 802.11b also supports the 2 Mbps data rate and operates on the 2.4GHz band in radio frequency for high-speed data communications As with any of the other 802 networking standards (Ethernet, Token Ring, etc.), the 802.11 specification affects the lower layers of the OSI reference model, the Physical and Data Link layers. The Physical Layer defines how data is transmitted over the physical medium. The IEEE assigned 802.11 two transmission methods for radio frequency (RF) and one for Infrared. The two RF methods are frequency hopping spread-spectrum (FHSS) and direct sequence spread-spectrum (DSSS). These transmission methods operate within the ISM (Industrial, Scientific, and Medical) 2.4 GHz band for unlicensed use...

Words: 4933 - Pages: 20

Premium Essay

Wireless Technology

...Wireless technology has become an increasingly crucial part of today's world. From health care and retail to academia across the world, wireless systems are improving the rate and ease with which data is sent and received. Two specific examples of the wireless technology used today personally and professionally are local area networks (LAN) and personal area networks (PAN). A wireless local area network, or LAN is a flexible data communications system implemented as an augmentation to, or an alternative for a, wired local area network. These networks rely on electromagnetic airwaves to transmit and receive over a defined area, usually a few hundred feet. (Yahoo-wireless) In most cases, a wireless transmitter will be connected directly to a wired land network using Ethernet cables. Once the network feed has been connected to the transmitter, and a constant power supply is established, a steady stream of radio, or infrared waves with be produced (both are electromagnetic waves). The vast majority of wireless LAN systems tend to rely on radio waves as the carries for their signals, because infrared waves tend to have a shorter distance at which they are able to transmit, and are more easily interrupted. Radio waves, or radio carriers as they are referred to, transfer data through modulations of the carrier signal. The addition of data to a radio carrier causes the signal to occupy more than a single frequency. Once data is imprinted onto the radio signal it is a simple reversal...

Words: 1672 - Pages: 7

Premium Essay

Along The River Mei Lan Quotes

...heroism prevails between good and evil. In the novel Along the River by Adeline Yen Mah, Mei Lan prevails as the main hero. She faces many challenges, but her main challenge is her stepmother who Mei Lan does not get along with at all. Mei Lan displays three main heroic qualities throughout the novel including friendship, bravery, and independence. Mei Lan’s friendly quality becomes visible when she begins to help and guide Ah Zhao. Ah Zhao was a very good artist who could draw, sculpt or paint anything one asked him too, but he lived as a barbarian orphan boy helping...

Words: 1004 - Pages: 5

Premium Essay

Exemptions

...networks Identify the physical and logical local area networks Cite the characteristics of wireless local area networks and their medium access control protocols Specify the different medium access control techniques Recognize the different IEEE 802 frame formats Describe the common local area network systems Chapter Outline 1. Introduction 2. Primary Function of Local Area Networks 3. Advantages and Disadvantages of Local Area Networks 4. The First Local Area Network – The Bus/Tree 5. Star-Wired Bus LANs 6. Medium Access Control Protocols a. Contention-based protocols 7. Bridges a. Transparent bridge 8. Switches a. Virtual LANs b. Isolating traffic patterns and providing multiple access c. Full-duplex switches 9. Popular Local Area Networks a. Wired Ethernet b. Wireless Ethernet 10. IEEE 802 a. IEEE 802.3 and 802.5 frame formats 11. LANs In Action: A Small Office Solution 12. LANs In Action: A Home Office Solution 13. Summary Lecture Notes Introduction A local area network (LAN) is a communication network that interconnects a variety of data communicating devices within a small geographic area and broadcasts data at high data transfer rates with very low error rates. Since the local area network first appeared in the 1970s, its use has become widespread in commercial and academic environments. It would be very difficult to imagine a collection of personal computers within a computing environment that does not employ some form of local area network. This chapter begins by...

Words: 4358 - Pages: 18

Free Essay

Business Data Communications and Networking

...Models – OSI model, Internet model, transmission via “layers” • Network Standards – Standards making, common standards • Future Trends – Pervasive networking, integration of voice, video, and data, new information services 1-3 Information Age • First Industrial Revolution – Introduction of machinery – New organizational methods – Changed the way people worked • Second Industrial Revolution – Information Age – Introduction of computers – Introduction of networking and data communication – Changed the way people worked again • Faster communication  Collapsing Information lag • Brought people together  Globalization 1-4 The Collapsing Information Lag Historical developments in electronic communications telegraph sped up the rate and volume of transmission of information 1850 Information took days or weeks to be transmitted 1900 Information transmitted in minutes or hours 1950 2007 large quantities of information transmitted in a fraction of a second growth of telecommunications and especially computer networks Globalization of networks 1-5 Advances in Phone Technology Phone invented 1876 first transcontinental and transatlantic phone connections 1915 1919 Packet-switched Telstar data (Telecommunications communications via satellite), Fax services, digital transmission (Tcarriers) 1962 1976 1948 1969 1984 Strowger (stepper) switch, rotary dial phones (enabling automatic connections) Microwave trunk lines (Canada) ...

Words: 1962 - Pages: 8

Premium Essay

Internetworking

...area network (LAN) is a communication network that interconnects a variety of data communicating devices within a small geographic area and broadcasts data at high data transfer rates with very low error rates. Since the local area network first appeared in the 1970s, its use has become widespread in commercial and academic environments. It would be very difficult to imagine a collection of personal computers within a computing environment that does not employ some form of local area network. This chapter begins by discussing the basic layouts or topologies of the most commonly found local area networks, followed by the medium access control protocols that allow a workstation to transmit data on the network. We will then examine most of the common local area network products such as Ethernet and token ring. Local Area Networks also called LANs have been a major player in industrialization of computers. In the past 20 or so years the worlds industry has be invaded with new computer technology. It has made such an impact on the way we do business that it has become essential with an ever growing need for improvement. LANs give an employer the ability to share information between computers with a simple relatively inexpensive system of network cards and software. It also lets the user or users share hardware such as Printers and scanners. The speed of access between the computers is lighting fast because the data has a short distance to cover. In most cases a LAN only occupies...

Words: 1743 - Pages: 7

Free Essay

Ankara

...An ISS Technical White Paper Wireless LAN Security 802.11b and Corporate Networks 6303 Barfield Road · Atlanta, GA 30328 Tel: 404.236.2600 · Fax: 404.236.2626 WWireWireless Lan Security 802.11b Wireless LAN Security Introduction Although a variety of wireless network technologies have or will soon reach the general business market, wireless LANs based on the 802.11 standard are the most likely candidate to become widely prevalent in corporate environments. Current 802.11b products operate at 2.4GHz, and deliver up to 11Mbps of bandwidth – comparable to a standard Ethernet wired LAN in performance. An upcoming version called 802.11a moves to a higher frequency range, and promises significantly faster speeds. It is expected to have security concerns similar to 802.11b. This low cost, combined with strong performance and ease of deployment, mean that many departments and individuals already use 802.11b, at home or at work – even if IT staff and security management administrators do not yet recognize wireless LANs as an approved technology. This paper addresses the security concerns raised by both current and upcoming 802.11 network technologies. Wireless LAN Business Drivers Without doubt, wireless LANs have a high gee-whiz factor. They provide always-on network connectivity, but don’t require a network cable. Office workers can roam from meeting to meeting throughout a building, constantly connected to the same network resources enjoyed by wired...

Words: 3757 - Pages: 16