Free Essay

It 240 Lan Week 1 Appendix B

In:

Submitted By jenfrey44
Words 790
Pages 4
Appendix B

LAN Operating Systems Scenarios

Read the three scenarios below and answer the questions that follow each scenario.

1. You are the network administrator for a new company that has 10 users and that plans to add 5 more users within a year. The files need to be accessed by all 10 users, and each user must have different security rights.

What kind of network would you install? How would the pieces and components of this network relate to each other? Define each component.

I think that for this particular situation I would set up an extended star network. I would choose this one because the business is relatively small and plans to grow, this type of network setup is very easy to add users onto and also still provides the access restriction needed for lower level employees and the ease of access for higher level employees without them being able to see what the other is able to access. “As the name implies, this topology is a star of stars. A central device, usually a switch, sits in the middle. Instead of attached computers forming the star’s arms, other switches (or hubs) are connected to the central switch’s ports. Computers and peripherals are then attached to these switches or hubs, forming additional stars. The extended star is sometimes referred to as a “hierarchical star” because there are two or more layers of stars, all connecting back to the central star (Tomsho, 2011).” I think that this network would be perfect for a small company that is planning to grow. Having more than one central location for all users to connect to will also improve network speed, security, and data access authorization better as well.

2. You are the network administrator for a company that has a peer-to-peer network.

How would the pieces and components of this network relate to each other? Define all the components of this type of network.

A peer to peer network is unique in that there is no central hub for any of the computers in the network to connect to. They are all simply connected to each other and each one holds a portion of the network capability, each one handles part of the memory requirements, the processing power, and the communication processes. Simply put, the components of this type of network are simply the computers that are connected to each other and the cables that connect them. Other than that the only other aspect of this particular type of system would be the software that each computer in the setup needs to have on it to be able to communicate with all the other units that it will be connected to through the cable. I think that this type of network setup would be perfect for a very small company or office environment that does not require more than 5 or 10 users. This kind of network does not allow for many additions to the network if there is a need for them and may require another network of this type separately to supplement for the need for more computers in the network without slowing the original network down.

3. You are the administrator of a client-server environment.

What kind of network would you install? How would the pieces and components of this network relate to each other? Define each component of a typical client/server environment.

For a client server environment I think that the best type of network for me to setup would be either a star or extended star network. This type of network is the most versatile example of a network that utilizes a single server for many users to connect to and get their information from. The star network consists of one server that a moderate amount of users can connect to and communicate to and from as well as communicate with all other users that are on the same sever. Each user connects to the server through cable, usually Ethernet, and each user usually has software that allows their computer to communicate correctly with the server. One of the really good administrative benefits of this type of network is that there is usually only one server that everyone is connected to which means that only that server needs to be monitored to be able to see what all users are doing instead of having to supervise each user individually. A broadband router may also be used in the client/server environment for example, to provide IP addresses to home or business computers that are not on the same site but need to access that server.

Resource: Tomsho, G. (2011). Guide to networking essentials (6th ed.). Clifton Park, NY: Course Technology, Cengage Learning.

Similar Documents

Premium Essay

It240

...|[pic] |Syllabus | | |College of Information Systems & Technology | | |IT/240 Version 4 | | |Intro to LAN Technologies | Copyright © 2012, 2009, 2007 by University of Phoenix. All rights reserved. Course Description This foundational course covers local area network topics including rationale for networking, the open systems interconnection (OSI) model, common network topologies and architecture, client/server concepts, basic hardware devices and usage, and basic networking security concepts. Policies Faculty and students will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you...

Words: 2355 - Pages: 10

Free Essay

Capstone Final Documentation

...Constraints………………………………………………………. 7 Deliverables………………………………………………………………………... 8 Project Details Implementation and Timeline……………………………………………… 9 Network Topology........................................................................................ 11 IP Schema…………………………………………………………………. 16 Security…………………………………………………………………….. 17 Active Directory Structure…………………………………………………………. 18 Active Directory and Exchange……………………………………………………..19 Website hosting and developing…………………………………………………… 20 Maintenance and Training Plan …………………………………………………….22 Risk Analysis………………………………………………………………………. 23 Backup Plan…………………………………………………………………………24 Cost Analysis………………………………………………………………………. 25 Appendix…………………………………………………………………………… 26 Appendix A: Cost Analysis…………………………………………………27 Appendix B: Hardware…………………………………………………….. 29 Introduction to Cornerstone Cornerstone Communications has been providing networking and data communications solutions for various companies since 2005. Cornerstone Communications has throughout the years stayed on top of current networking trends and technologies to ensure reliability and extensive network lifetimes for our customers. Our clients range all across the northeastern states of the U.S. Cornerstone Communications mission to its customers is to provide them a network resolution...

Words: 7795 - Pages: 32

Premium Essay

Comprehensive Aap

...house approximately 200 staff members. The newly hired IT team will provide the New York office with a state of the art network design. The initiative will focus on the reinforcement of reported security vulnerabilities at other WWTC locations. This design will exceed all other previous standards and set the mold for other businesses to emulate. Project Goal The goal of this project is to increase WWTC revenue from 10 billion to 40 billion dollars by the within the next three to four years. The focus lies within reducing operating costs from 30 to 15 percent by using an automated system for the buying and selling of goods, or, e-commerce. With the implementation of a new, highly scalable, fast and efficient Local/Wide Area Network (LAN/WAN), WWTC will be able to achieve its goals by providing both management and staff with reliable global communications. The network must also be secure in order to maintain good business relationships with consumers and investors alike. Sensitive information traversing the WWTC network (identities, company data) will be protected using state of the art networking tools/equipment and will only be used in an...

Words: 7472 - Pages: 30

Free Essay

Paper 1

...MacBook User’s Guide Includes setup, expansion, and troubleshooting information for your MacBook computer K Apple Computer, Inc © 2006 Apple Computer, Inc. All rights reserved. Under the copyright laws, this manual may not be copied, in whole or in part, without the written consent of Apple. Every effort has been made to ensure that the information in this manual is accurate. Apple is not responsible for printing or clerical errors. Apple 1 Infinite Loop Cupertino, CA 95014-2084 408-996-1010 www.apple.com Apple, the Apple logo, AirPort, AppleTalk, Final Cut, FireWire, iCal, iDVD, iLife, iMac, iMovie, iPhoto, iPod, iTunes, Mac, Macintosh, Mac OS, and QuickTime are trademarks of Apple Computer, Inc., registered in the U.S. and other countries. AirPort Express, Exposé, FileVault, Finder, the FireWire logo, iSight, MacBook, Macintosh Products Guide, MagSafe, Safari, Spotlight, SuperDrive, and Tiger are trademarks of Apple Computer, Inc. AppleCare, Apple Store, and iTunes Music Store are service marks of Apple Computer, Inc., registered in the U.S. and other countries. .Mac is a service mark of Apple Computer, Inc. ENERGY STAR® is a U.S. registered trademark. Intel and Intel Core are trademarks of Intel Corp. in the U.S. and other countries. The Bluetooth® word mark and logos are owned by the Bluetooth SIG, Inc. and any use of such marks by Apple Computer, Inc. is under license. Other company and product names mentioned herein are trademarks of their respective companies....

Words: 24206 - Pages: 97

Premium Essay

Cyberhub Internet Cafe

...Republic of the Philippines NUEVA ECIJA UNIVERSITY OF SCIENCE AND TECHNOLOGY Cabanatuan City A FEASIBILITY STUDY ON THE PROPOSED CYBERHUB INTERNET SHOP In partial Fulfilment of the Course Requirements in PROJECT FEASIBILITY STUDY Mr. Ferigrino Urbano Adviser Marco Joseph Bernacer Bernardo Balic Nelson Galang Timtus Oliver Torres Jaydee Nilo Merberth Silvestre Joey Gutierrez September 19, 2011 RECOMMENDATION FOR ORAL EXAMINATION This Project Feasibility Study entitled “A FEASIBILITY STUDY ON THE PROPOSED CYBERHUB INTERNET SHOP”, prepared and submitted by Marco Joseph Bernacer, Bernardo Balic, Nelson Galang, Timtus Oliver Torres, Jaydee Nilo, Merberth Silvestre, and Joey Gutierrez, in partial fulfilment on the requirements in the subject PROJECT FEASIBILITY STUDY has been examined and recommended for Oral Examination. APPROVAL SHEET Accepted for Oral Examination Mr. Felipe E Balaria Chairman Panel Members Mrs. Mercedes Santos Ms. Joy Nacino Mr. Juvenal Yabut Accepted in partial fulfilment of the requirements in the subject PROJECT FEASIBILITY STUDY. Mr. Ferigrino Urbano Adviser Ms. Jocelyn Cruz Dean. CMBT ACKNOWLEDGMENT The researchers would like to extend their special appreciation to the following persons: Mr Ferigrino M. Urbano, their feasibility study Adviser, for his guidance and unwavering support; Miss Cherry Hernandez, owner of Kanuto’s Internet Shop for the information she furnished the...

Words: 13550 - Pages: 55

Premium Essay

Data Communications and Networking by Behrouz A.Forouzan

...Don't forget to check out the Online Learning Center, www.mhhe.com/forouzan for additional resources! Instructors and students using Data Communications and Networking, Fourth Edition by Behrouz A. Forouzan will find a wide variety of resources available at the Online Learning Center, www.mhhe.comlforouzan Instructor Resources Instructors can access the following resources by contacting their McGraw-Hill Representative for a secure password. PowerPoint Slides. Contain figures, tables, highlighted points, and brief descriptions of each section. Complete Solutions Manual. Password-protected solutions to all end-of-chapter problems are provided. a Pageout. A free tool that helps you create your own course website. D Instructor Message Board. Allows you to share ideas with other instructors using the text. a o Student Resources The student resources are available to those students using the book. Once you have accessed the Online Learning Center, click on "Student Resources," then select a chapter from the drop down menu that appears. Each chapter has a wealth of materials to help you review communications and networking concepts. Included are: Chapter Summaries. Bulleted summary points provide an essential review of major ideas and concepts covered in each chapter. a Student Solutions Manual. Contains answers for odd-numbered problems. Glossary. Defines key terms presented in the book. Flashcards. Facilitate learning through practice and review. a Animated Figures...

Words: 59848 - Pages: 240

Premium Essay

Looko

...document. Elitecore reserves the right, without notice to make changes in product design or specifications. Information is subject to change without notice. USER’S LICENSE The Appliance described in this document is furnished under the terms of Elitecore’s End User license agreement. Please read these terms and conditions carefully before using the Appliance. By using this Appliance, you agree to be bound by the terms and conditions of this license. If you do not agree with the terms of this license, promptly return the unused Appliance and manual (with proof of payment) to the place of purchase for a full refund. LIMITED WARRANTY Software: Elitecore warrants for a period of ninety (90) days from the date of shipment from Elitecore: (1) the media on which the Software is furnished will be free of defects in materials and workmanship under normal use; and (2) the Software substantially conforms to its published specifications except for the foregoing, the software is provided AS IS. This limited warranty extends only to the customer as the original licenses. Customers exclusive remedy and the entire liability of Elitecore and its suppliers under this warranty will be, at Elitecore or its service center’s option, repair, replacement, or refund of the software if reported (or, upon, request, returned) to the party supplying the software to the customer. In no event does Elitecore warrant that the Software is error free, or that the...

Words: 48399 - Pages: 194

Premium Essay

Cola

...SCHOOL OF PHARMACY REPORT WRITING UCS 1263 Assignment 1 Hospital Attachment Report Name : Thiban Ellumalay ID : 012011051056 Programme : BPH Lecturer Name : Dr. Jiyauddin Khan Submission Date : 30th September 2013 An attachment report based on the lesson learned, activity being carried out, experience gained, problem faced and suggestion at Hospital Tuanku Ampuan Rahimah, Klang in various pharmacy departments for period of 3 weeks Submitted to Dr. Jiyauddin Khan, PhD Report writing lecturer, School of Pharmacy Management & Science University Shah Alam, Selangor Darul Ehsan, Malaysia. Prepared by, Thiban Ellumalay, 012011051056 3rd year Bachelor of Pharmacy, Management & Science University Shah Alam, Selangor Darul Ehsan, Malaysia. 30th September 2013 Acknowledgement First and foremost I would like to thank the almighty lord for giving me wisdom to get my attachment done with successfully as well as with the preparation of the report. Without his blessings I wouldn’t have achieved this stage. Besides that, throughout my attachment accomplishment, many people have inspired me, influenced me and contributed their time, energy, ideas, and suggestions for improving my report. I will always be in debt to these people, too numerous to mention. I would...

Words: 7449 - Pages: 30

Premium Essay

Impotent Music

...INFORMATION RESOURCE GUIDE Computer, Internet and Network Systems Security An Introduction to Security i Security Manual Compiled By: S.K.PARMAR, Cst N.Cowichan Duncan RCMP Det 6060 Canada Ave., Duncan, BC 250-748-5522 sunny@seaside.net This publication is for informational purposes only. In no way should this publication by interpreted as offering legal or accounting advice. If legal or other professional advice is needed it is encouraged that you seek it from the appropriate source. All product & company names mentioned in this manual are the [registered] trademarks of their respective owners. The mention of a product or company does not in itself constitute an endorsement. The articles, documents, publications, presentations, and white papers referenced and used to compile this manual are copyright protected by the original authors. Please give credit where it is due and obtain permission to use these. All material contained has been used with permission from the original author(s) or representing agent/organization. ii T eofContent abl 1.0 INTRODUCTION........................................................................................................................................................... 2 1.1 BASIC INTERNET TECHNICAL DETAILS ........................................................................................................................ 2 1.1.1 TCP/IP : Transmission Control Protocol/Internet Protocol .........................................

Words: 134858 - Pages: 540

Premium Essay

Top Down Cisco

...Oppenheimer Cisco Press 800 East 96th Street Indianapolis, IN 46240 ii Top-Down Network Design Top-Down Network Design, Third Edition Priscilla Oppenheimer Copyright© 2011 Cisco Systems, Inc. Published by: Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher, except for the inclusion of brief quotations in a review. Printed in the United States of America First Printing August 2010 Library of Congress Cataloging-in-Publication data is on file. ISBN-13: 978-1-58720-283-4 ISBN-10: 1-58720-283-2 Warning and Disclaimer This book is designed to provide information about top-down network design. Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information is provided on an “as is” basis. The author, Cisco Press, and Cisco Systems, Inc. shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the discs or programs that may accompany it. The opinions expressed in this book belong to the author and are not necessarily those of Cisco Systems, Inc. Trademark Acknowledgments All terms mentioned in this book that...

Words: 79785 - Pages: 320

Premium Essay

Leo's Cuisine Point of Sale System

...CHAPTER 1 PROJECT BACKGROUND 1.1 Introduction The simple approach Open Data File for Input soon became fraught with all kinds of problems that needed to be addressed. Computer system vendors needed to be able to support the critical needs of a growing and evolving market place that supported the data processing needs of organizations in all fields of human endeavor1. So an innovation comes up – database and DBMS - as a remedy to these huge crises. A database is a collection of related files that are usually integrated, linked or cross-referenced to one another. The advantage of a database is that data and records contained in different files can be easily organized and retrieved using specialized database management software called a database management system (DBMS) or database manager. A database management system is a set of software programs that allows users to create, edit and update data in database files, and store and retrieve data from those database files all using a DBMS2. It consists of a combination of pre-written software programs controlling the following functions of a database: Storage; Organization; Management; Update; and Retrieval of data. A DBMS is categorized according to the data types and structures in use. It accepts and processes data requests from an application program, and responds by instructing the operating system to access and transfer the relevant data. With a DBMS in use, it is easier for an organization to make alterations to their...

Words: 9453 - Pages: 38

Free Essay

Rute Linux Tutorial

...saying things like “Look” in a stern voice was necessarily going to get him, and time was not on his side. What the hell, he thought, you’re only young once, and threw himself out of the window. That would at least keep the element of surprise on his side. ... In a spirit of scientific inquiry he hurled himself out of the window again. Douglas Adams Mostly Harmless Strangely, the thing that least intrigued me was how they’d managed to get it all done. I suppose I sort of knew. If I’d learned one thing from traveling, it was that the way to get things done was to go ahead and do them. Don’t talk about going to Borneo. Book a ticket, get a visa, pack a bag, and it just happens. Alex Garland The Beach vi Chapter Summary 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Computing Sub-basics . . . . . . . . . . . . . . . . . . ....

Words: 159689 - Pages: 639

Premium Essay

Business Plan 2014 - 2019

...FIDAIS 18 Training 19 Keeping Yourself Safe Pre-Teens & Teens 19 Judiciary: Understanding Digital Forensic Evidence 19 Defending: Understanding Digital Forensic Evidence 19 Stop It! Remove It! Volunteer! 20 Damocles and FIDAIS 20 The CCS Label 21 Office Setup 22 Video and Development Computer 22 Computer Table 23 Computer Chair 23 Desktop Lamp 23 Printer 23 External Storage 23 Graphics Tablet 24 Consumables 25 Adobe 25 Disc Producer 26 The Green Room 27 The Video Camera 27 Salaries 29 Administrator Salary 29 Asst. Project Manager / Senior Administrator 29 The Project Manager 29 Summary Costs for 2014-2015 31 2014 – 2019 Financial Forecast 32 Contact Information 35 Appendix A 36 Appendix B 40 Appendix C 41 Table 1 Honour Roll 5 Table 2 Amanda Todd’s Suicide Note 14 Table 3 Impression of how our T-shirts could look. 21 Table 4 Project Manager's Office Setup 22 Table 5 Project Manager's consumables 25 Table 6 Salary Breakdown 29 Table 7 Summary of Setup Costs 31 Table 8 2014 -2015 Forecast 32 Table 9 2015 - 2015 Forecast 32 Table 10 2016 - 2017 Forecast 33 Table 11 2017 - 2018 Forecast 33 Table 12 2018 - 2019 Forecast 34 4 vFORTori Blair Wilson Aged 8Montana Lance Aged 9Aaron Dugmore Aged 9Ashlynn Connor Aged 10Jasmine McClain Aged...

Words: 9165 - Pages: 37

Premium Essay

Workplace

...case study of the changes that the Boeing Commercial Aircraft Company made in the way they design and build airplanes. The 777 is the first jet that Boeing has created using this methodology. The changes were very dramatic and encompassed many areas, including technical, organizational and administrative changes. Boeing is touting the 777 as more than just a product, but as a new process. Although the technical innovations were numerous, what made the 777 project unique were the other changes Boeing instituted for this design/build effort. It was the first 100% digitally designed and pre-assembled airplane made by Boeing. Concurrent engineering, the concept of “Working Together”, was an integral part of the new philosophy and nearly 240 Design/Build teams were used through-out the process. The teams included design, manufacturing, customer and supplier personnel from the start. Designing and building a new commercial jet airliner is a long, five to ten years, and infrequent, one or two per decade, process. As such, it is crucial to document the design/build process for future projects, especially one that had so many “firsts”. A multimedia case study is an ideal vehicle for teaching engineers within Boeing as well as engineering students the design/build process of a large and complex product....

Words: 7527 - Pages: 31

Premium Essay

Managing Risks

...Lar03342_ch07_210-251.indd Page 210 2/3/10 4:37:12 PM user-f498 /Users/user-f498/Desktop/03:02_evening/MHBR165:Larson:208 C H A P T E R S E V E N Managing Risk Estimate 5 Project networks 6 Schedule resources & costs 8 l iona rnat Inte ojects pr 15 Define project 4 Reducing duration 9 Introduction 1 Organization 3 Managing risk 7 Monitoring progress 13 Project closure 14 16 Oversig ht 17 Agile P M Strategy 2 Leadership 10 Teams 11 Outsourcing 12 18 Career paths Managing Risk Risk Management Process Step 1: Risk Identification Step 2: Risk Assessment Step 3: Risk Response Development Opportunity Management Contingency Planning Contingency Funding and Time Buffers Step 4: Risk Response Control Change Control Management Summary Appendix 7.1: PERT and PERT Simulation 210 Lar03342_ch07_210-251.indd Page 211 1/30/10 4:54:39 PM user-f501 /Users/user-f501/Desktop/Tempwork/JANUARY 2010/30-01-10/MHBR165:Lars You’ve got to go out on a limb sometimes because that’s where the fruit is. Will Rogers Every project manager understands risks are inherent in projects. No amount of planning can overcome risk, or the inability to control chance events. In the context of projects, risk is an uncertain event or condition that, if it occurs, has a positive or negative effect on project objectives. A risk has a cause and, if it occurs, a consequence. For example, a cause may be a flu virus or change in scope...

Words: 18517 - Pages: 75