...Aybar IT/240 LAN Topologies Scott Perales April 27, 2014 Case 2-1 I would recommend the use of a central server which will ease up the process of controlling the incoming and outgoing data transmission. The central server will help the network not get overloaded with the amount of data packets being received and sent. In relation with the Hubs, it will be beneficiary to update them to be able to hubs with the capacity of 1,000 Mbps. This will also help with the overall network performance. Case 2-2 In this case, I will replace the switches and install routers instead. Routers have a better capability in joining together multiple LAN networks with WAN. Routers serves as a median destination for the network traffic. The routers with these workstations will be able to receive, analyzed the source and potential target, and where every packet will need to be sent to. Switches in this scenario, are not able to separate the broadcast domain like the router could; switches are only able to separate the collision in the domain. A network with only switches (hubs) must instead designate one computer as the gateway to the Internet, and that device must possess two network adapters for sharing, one for the home LAN and one for the Internet WAN. (Mitchell, 2014). Case 2-3 Logical/physical topology: A logical topology is the way...
Words: 452 - Pages: 2
...LAN Topologies Jason Smith IT/240 September 7 2014 TAMMY FLEMONS LAN Topologies Case Project 2-1 You have been hired to upgrade a network of 50 computers currently connected to 10 Mbps hubs. This long-overdue upgrade is necessary because of poor network response time caused by a lot of collisions occurring during long file transfers between clients and servers. How do you recommend upgrading this network? What interconnecting devices will you use, and what benefit will you get from using these devices? Write a short memo describing the upgrade and, if possible, include a drawing of the new network. This system ought to have a central server that can control approaching and cordial transmissions. A central server would prevent the whole system from being hindered due to information parcels being sent and acquired. What's more, the center points ought to be moved up to handle 1000 Mbps. The following is a sample of what a littler variant would look like. I think I would use the physical star topology for this setup. Case Project 2-2 Two hundred workstations and four servers on a single LAN are connected by a number of switches. You’re seeing an excessive number of broadcast packets Throughout the LAN and want to decrease the effect this broadcast traffic has on your network. What steps must you take to achieve this goal? Utilizing an expanded star topology would diminish the impacts of the telecast...
Words: 677 - Pages: 3
...Robert W. Ramirez LAN Topologies IT/240 Carlos Zapata May 31, 2014 LAN Topologies Case Project I The changes in equipment that would be required to bring Old-Tech Corporation up to date and solve the shared bandwidth problem would be to change their network scheme. To go from a Star topology to and extended star topology, which their logical topology would be a ring. We would have to buy five wireless nic-cards to start to accommodate the cabling issue in the warehouse as well as a wireless access point and a wireless router. Case Project II EBiz.com would do well with a Switched Logical topology using a physical star topology. The Network will be Server based running four or five servers each with a certain task. The network will host at least 250 computers not including the servers with room to accommodate at least 50 more computers for future employees. I will implement a number of switches to accommodate the three or more floors that we need to access. Case Project III ENorm Inc. would do well with a Mesh Topology; we would use existing wiring closets to run the new cables needed to setup the network. We would also setup the wireless WAN to connect the two offices together. The network will be server based and will have a separate data base server at each location to handle application and data at each location, but accessible to all who need to have access to it. We would have switches in place to handle the necessary bandwidth we decide to go...
Words: 265 - Pages: 2
...LAN Topologies IT/240 Intro to LAN Technologies 4/29/2014 Farooq Afzal Case 3-1 In my opinion a client/server system with an extended star topology would be the best choice for Old-Tech Corporation. I would replace the 10 Mbps Ethernet cord with an 100 Mbps Ethernet cord to ensure a faster more reliable connection. The extended star topology will allow each computer to have access to shared files and the administrator can delegate which computer has access to which information within the network. I would make sure that we when we do the upgrade the computers are all connected with wireless NIC. Case 3-2 EBiz.com should be upgraded to have a Switched Logical Topology using an extended star topology. This network should be server based with several servers, each server would have its own task. The network should have at a minimum of 250 computers and have room for upgrades of 50 or more computers. I would install more switches to accommodate each floor of the building. This would be done for each floor with the servers having a room of their own. Case 3-3 For this Case Project I would suggest that ENorm set up the system as a Server Based computer system with Mesh Topology. We could...
Words: 253 - Pages: 2
...Boot.ini, use modified Boot.ini Services-Located in administrative tools, used to stop and start individual services while troubleshooting your computer. Services utility ca be accessed through the computer management utility and MS Config utility. Event Viewer: Located in Admin Tools * Application-information, warning, error * Security- failure, success * System- information, warning, error Types of Networks: * LAN(Local Area Network) * WAN(Wide Area Network) Administering a LAN: Peer to Peer: * 10 or fewer computers * All computers are equal * Local administration * Local security * Local control of resources Client Server: * Scalable network * Central administration * Centralized security * Centralize control of resources Networking Models: Workgroup: * Peer-to-peer network * All computers are equal Domain: * Client server network * At least one server promoted to role of domain controller * Servers manage domain administration Network Topologies: Four Topologies: * Bus * Ring * Star * Mesh Bus: * Single cable connects all devices * Requires 50ohm terminator(resistor) at each end * Easy to create * Less expensive * Each node represents a single point of failure * Difficult to troubleshoot Ring: * Message must travel to each node in the ring * Extremely reliable message delivery * Each node is a single point of failure...
Words: 489 - Pages: 2
...Network Consultant Scenarios Joshua Lillis IT/240 July 20th, 2014 Network Consultant Scenarios * What changes in equipment are required to bring this company’s network up to date to solve the shared-bandwidth problem? Since the office has 10 workstations connected to a 10 Mbps hub, each computer average bandwidth is 1 Mbps. Since the LAN is relatively small, you can change it to a 100 MB switch. Even if their NICs are only 10 MB, they can upgrade their NICs as need be. Since seem to transfer large files often, so this will allow for the transfers to go smoothly and not bog down the network. Effectively the transfer rate is 200 Mbps depending on what their NICs are capable of. * What topology and which type of device can be used in the manufacturing area to solve the cabling difficulties? The type of topology that would be used is an extended star network, since it will be connected to the office, which uses a star network topology. The device that would be used to overcome the cabling difficulties would be a Wireless Access Point, using a wireless router. We would need to buy Wireless NICs for each of the computers in the manufacturing areas. In case 3-1 the type of network it would be, is a client based model. It is a client based model since there is no centralized server. Old-Tech’s computers transfer large amounts of files to each other on the network. Since any of the users can share their resources on their computer, each person needs determine...
Words: 697 - Pages: 3
...|[pic] |Syllabus | | |College of Information Systems & Technology | | |IT/240 Version 4 | | |Intro to LAN Technologies | Copyright © 2012, 2009, 2007 by University of Phoenix. All rights reserved. Course Description This foundational course covers local area network topics including rationale for networking, the open systems interconnection (OSI) model, common network topologies and architecture, client/server concepts, basic hardware devices and usage, and basic networking security concepts. Policies Faculty and students will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you...
Words: 2355 - Pages: 10
...LAN Consulting Plan IT/240 February 26, 2012 James (Garrett) Miller LAN Consulting Plan Data Assurance: 1. Backup system: a. Type? Backup of data will be done with the Norton 360 version 6.0 antivirus protection suite provided backup utility, Symantec Backup Exec. There are two types of backup for this network. The first is a digital tape drive backup that is located on site for intermediate recovery based on the disaster conditions. The second backup is a mirror backup on a bank of servers at an external site to ensure the security of the data in the case of total disaster of the network site. b. Backup Schedule? The backup schedule will be determined by the importance of the information. Business critical information will be backed up at the completion of the task. A scheduled mirror backup will be done daily during the off business hours. c. Backup Data Storage plan? The first backed up data will be stored on an independent server drive using RAID at the main site location for ease of access in the case of an independent component failure. The second backup will be also use RAID and be stored at a different graphical location than the network. Data Integrity: 1. Antivirus system: a. Type? Norton 360 version 6.0 antivirus program is installed at each geographical location including the offsite backup of the network. This security protection will provide virus protection, spyware protection, and scan incoming and outgoing e-mail...
Words: 1841 - Pages: 8
...LAN Consulting Plan IT/240 February 26, 2012 James (Garrett) Miller LAN Consulting Plan Data Assurance: 1. Backup system: a. Type? Backup of data will be done with the Norton 360 version 6.0 antivirus protection suite provided backup utility, Symantec Backup Exec. There are two types of backup for this network. The first is a digital tape drive backup that is located on site for intermediate recovery based on the disaster conditions. The second backup is a mirror backup on a bank of servers at an external site to ensure the security of the data in the case of total disaster of the network site. b. Backup Schedule? The backup schedule will be determined by the importance of the information. Business critical information will be backed up at the completion of the task. A scheduled mirror backup will be done daily during the off business hours. c. Backup Data Storage plan? The first backed up data will be stored on an independent server drive using RAID at the main site location for ease of access in the case of an independent component failure. The second backup will be also use RAID and be stored at a different graphical location than the network. Data Integrity: 1. Antivirus system: a. Type? Norton 360 version 6.0 antivirus program is installed at each geographical location including the offsite backup of the network. This security protection will provide virus protection, spyware protection, and scan incoming and outgoing e-mail...
Words: 1841 - Pages: 8
...It terminates the internet connection in each office. There is a site to site VPN tunnel between the two devices, connected over the internet. The SonicWALL is the default gateway (router) in each office that routes traffic either to the internet or between offices and acts as the firewall between LAN and WAN. This device also enables VPN tunnels for telecommuters (Implementation Consultants) to connect to the office as necessary. In both the current and proposed network; the logical typology is a star as describe below: Logical topology: Star (switched Ethernet) This is because the design is a switched based Ethernet approach. The switch at the centre manages (is connected to) the sets of separate point to point circuits (Fitzgerald et al. 2012 p208). The advantage withthis approach is that the circuit connecting the switch and the device does not need to be shared. Ideally this will allow the circuit to realise its full potential. In both the current and proposed network the physical topology is a Star. This topology accurately represents the current and proposed network because the way the network is physically installed is replicated below, that is; each device is connected to a switch (FitzGerald and Dennis, 2005). Servers Domain Controller (runs DHCP and DNS functions) all...
Words: 946 - Pages: 4
...ITT Capstone Project NT2799: Network Systems Administration | Donna Williamson, Andy Lara, Mary Hunter, Carlos Vargas, Matt Koppe, Morten Laigaard Donna Williamson, Andy Lara, Mary Hunter, Carlos Vargas, Matt Koppe, Morten Laigaard Table of Contents Part 1: Structure of WAN2 Part 2: Types of Equipment7 Part 3: Protocol Choices25 Part 4: Phone System73 Part 5: Security Proposal78 References89-92 Part 1 Structure of WAN Structure of WAN- Mary Hunter We have initially considered our LAN components and began our documentation. We have planed the design and determined all resources involved. We have considered and interviewed all the stakeholders involved. We are in the beginning stage, so the components, resources, stakeholders and design may change. We will use switches to connect hosts to the internetwork, and both hubs and switches will be used to interconnect devices in our star network architecture. This way if we need to add workstations we will only have to insert another hub or switch. All of ABC worldwide offices will include file services, print services, message services, directory services, and application services. All of the offices will have the use of a file server for file sharing backing up files and storage. They will have access to a print server that will include Queue-based printing and print sharing; a message server that will allow for e-mails with attachment files, including video, sound, and documents. All the offices will have access to a...
Words: 13943 - Pages: 56
...control panel is the central control device that receives information from input devices such as smoke detectors, heat detectors, manual call points, etc. The panel then processes the information to trigger output devices which are usually bells, horns, or strobes. Panels usually have a number of loops within the range of two to 20 loops. At the present time, four or six loop panels are the most common. Each loop can have a number of devices connected to it. Each device has its own address, and so the panel knows the state of each individual device connected to it. There are three types of panels: coded panels, conventional panels, and addressable panels. A fire alarm control panel • Primary Power supply: Commonly the non-switched 220/240 Volt Alternating Current source supplied from a commercial power utility. In non-residential applications, a branch circuit dedicated to the fire alarm system and its constituents. "Dedicated branch circuits" should not be confused...
Words: 14033 - Pages: 57
...Network Design A. Network Topology Business Needs Since 1947, UMUC has been providing quality education to the American as well as international students. UMUC is always developing new ideas and ventures to enhance the quality of the education that it’s students receive. In an effort to expand it’s academic and cultural knowledge to the growing student population UMUC has recently purchased an building and is moving forward with the plan to utilize it as a computer education and lab facility. The building is named as “ Library and Communication Center”. Establishment of this facility will provide the current and future students and faculty members to gain and impart computer knowledge in an environment that is technologically proficient in meeting the demands of the ever-increasing computer skills. The purpose of this document is to identify the requirements, develop an overall design and specifications for the Library and Communication Center to be completely functional. Proposed Topology Select one or more topologies to use for this design. This section should be used to provide details of the selected infrastructure or equipment. Include the model, manufacturer, features, and cost. In order to develop a good network layout plan, we have to first understand the layout of the building. The Library and Communication Center is a 50-year-old building. The specifications of the building is as follows: Area | Measurements | Length | 240 ft | Width | 90 ft | ...
Words: 1674 - Pages: 7
...Abstract AAS-Design AAS-Design is a North American fashion label specializing in luxury goods for men and women (ready-to-wear, leather accessories, shoes, luggage and hats), founded in 1990 by Abel, Angus and Satish in Virginia Beach, Virginia. Fulana inherited the company in 1995 by which time sales were up to U.S. $450,000. With John alongside her as business manager, Fulana was allowed time to implement her creativity onto design. Initial success was not instant, as they were hard to sell due to the lack of advertising and high-prices, but later become her first commercial hit. Description of technology and Communications Need: IT Department The IT Department is in the third floor of corporate building. From this place the IT department offer supports to the entire corporate building and the rest of the store in U.S. The implementation of news technology indicates the degree of business transformation varies significantly between firms. Improving processes usually involves implementing systems and process management across business function boundaries rather than within functions. IT infrastructure investments can be a constraint where systems are not compatible, or where inconsistent data models have been used in different parts of the business. (Broadbent, M., Weill, P., Clair, Don St, 1999) As companies grow, their IT Infrastructure evolves, requiring additional capacity and process efficiencies. The IT infrastructure required to support a company's operations...
Words: 4651 - Pages: 19
...TOPICS COVERED q Communication Networks q Network Types q Classification Geographic q Protocols and Standards q System Requirements q Labs & Exercises Communication & Networks BASEBAND Network is one in which the cable or other network medium can carry only a single signal at any time. vs. BROADBAND Network can carry multiple signals simultaneously, using discrete frequency for each signal. How Network Communicates ? Server Is a Computer running process that provides a service to other computers when they request it. Client Is a Computer running process that request a service from the server. Network Types Client - Server Peer to Peer Network’s Geographic PAN - Personal Area Network LAN - Local Area Network MAN - Metropolitan Area Network WAN - Wide Area Network ü Size ü Transmission...
Words: 2163 - Pages: 9