...|[pic] |Syllabus | | |College of Information Systems & Technology | | |IT/240 Version 4 | | |Intro to LAN Technologies | Copyright © 2012, 2009, 2007 by University of Phoenix. All rights reserved. Course Description This foundational course covers local area network topics including rationale for networking, the open systems interconnection (OSI) model, common network topologies and architecture, client/server concepts, basic hardware devices and usage, and basic networking security concepts. Policies Faculty and students will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you...
Words: 2355 - Pages: 10
...11/7/2013Associate Level Material Appendix C OSI Model Key Terms Table Use the following table to define the key terms related to the OSI model. Describe the functions of any hardware connectivity devices and tools listed. |TTerm |Definition |Function | | | |(if applicable) | |Physical layer |Responsible for the transmission of bits |Converts data to physical signals that | | |across the network’s physical medium. |represent o’s and 1’s and then transmits | | | |the physical signals to its destination. | |Data link layer |Responsible for error free data |Divides data received from the network | | |transmission and establishing local |layer into frames the physical layer can | | |connections between two computers. |transmit. | |Network layer |Responsible for addressing and routing |Establishes, maintains and terminates | | |processes...
Words: 754 - Pages: 4
...Check Point Threat Categorization IT240 May 10, 2013 Check Point Threat Categorization |Define each of the following terms in your own words: | | | |Boot sector - Is the area of the computer that contains storage devices like hard drives, and is the area where the firmware and software boot from | |because the codes are located here. | |File – Is a place where data is stored on a computer, there are many different types of files and most if not all data is stored in a file. | |Multipartite - divided or having many sectors, very applicable to computers since they have many parts and are divided into sectors and sections. | |Macro – Instructions, usually one that can automatically turn into more instructions. | |Trojan horse - A virus that allows a backdoor into a computer affecting the computer without the users knowledge and allows the information stored | |on the infected computer to be stolen. | |E-mail worms – A worm that...
Words: 829 - Pages: 4
...Associate Program Material Appendix K Currency Conversion Peer Review Design Inspection Report |Programmer’s Name: |Ken | |Date of Inspection |4/1/2012 | |Inspector’s Name: |Ken | Use the following criteria to evaluate the Currency Conversion Test Procedure. If the answer to the item question is yes, place an X next to that item under the Yes column. If the answer is no, add details next to that item under the Comments column. | |Yes |Item |Comments | | |X |Is the problem description clear, concise, and accurate? | | | |X |Are the inputs to the program identified? | | | |X |Are the outputs to the program identified? | | | |X |Does the test input result in the expected output? | | List of Defects Identify defects by checklist number and observed error, but do not include any...
Words: 399 - Pages: 2
...|Week Two Check Point: OSI Model Key Terms Table | | |Points Earned |Points Possible | | |Suggested response: | | | |Term | | | |Definition | |Function | |(if applicable) | | | |Physical layer...
Words: 556 - Pages: 3
...Individual: Disaster Plan Jaime DiPaulo Jr 04/7/14 IT/240 John Helt I chose to analyze and formulate a disaster plan for Company A -Computers. Although the differences between Company A and Company B are more than slight in the approach they choose for the operation of their network, the concept of network security means the same thing. Zooming in on Company A, there is information of approx. 10,000 employees that travels through an unprotected portal that shares the company email server. This is about as serious of a threat as there is. Laid out within this written document are enactments much, much recommended. These implementations work together much like the individual pieces of a knight’s armor overlap each other a bit, meanwhile the sword and shield are actively about in front of; ready for an attack on their network. The following paragraphs are outlined in the order of the OSI model. Protecting all of the important assets of XYZ Computers means keeping them in a safe place, whether in storage or in full operation. According to Appendix G, there was a flood on the first floor that caused damage to all of the equipment. To protect the equipment from flooding, which is a seemingly big problem in the south, the equipment should be elevated from the immediate floor by means of some type of moat around the equipment or moved up to the second floor. The drainage system should also be further inspected to ensure there are not other pipe-bursting dangers. Also...
Words: 1498 - Pages: 6
...LAN Topologies IT240 10/14/12 1. Case Project 2-1 With a network of 50 computers I will use the Ring Topology to upgrade this network. With this type of topology all the devices are connecting in a loop form and the information travels in one direction, thus avoiding collisions. Here the cabling doesn’t terminate, it continually goes from one device to another till it gets back to the original device. It is also easier to manage the network since all the information is passed around the ring in the same direction. 2. Case project 2-2 With that many computer and four servers, I will use an Extended Star Topology. As pointed out in the case project that there are a few switches available here, I will use a central switch and connect the rest of the available switches to it and connect the 200 PC’s to those switches. Switches are good for determining each individual packet’s destination and ensuring that they are delivered to the right device. Note Even though they might have two different uses in some cases, the hubs in my diagram represent the switches. 3. Case project 2-3 * Physical versus logical topology: A physical topology defines how the devices on a particular network are physically connected; logical on the contrast tells us how the systems on the...
Words: 415 - Pages: 2
...LAN Topologies Lord Bones IT240 Jan 01, University of Phoenix - AXIA College LAN Topologies With this assignment I will discuss some topologies of a LAN as requested by questions 11, 12, and 13, chapter three from the textbook Local Area Networks. A “LAN (Local Area Network) topology is the appearance or layout of a network” (Regan, 2006). There are two forms of topologies of a network, namely, the physical- and logical topology with each its own types of topologies. The physical topology is what someone can see with his or her own eyes, i.e. a workstation, servers, cables, etc. while the logical topology is the dataflow of the network, how the data is moving from one point to another (Regan, 2006). In the following I will describe two physical topology types and one logical topology type, following the scenarios in the question’s mentioned above. In the first scenario there are four servers in the network with no hub present. The first (A) server is connected to the second (B), third (C), and the fourth (D). The second is connected to the third and fourth, while the third is connected to the fourth. (See figure 1.) This type of physical topology is called a Mesh Topology. A Mesh Topology is a topology where “every computer is linked to every other computer” (Regan, 2006). With this type of topology there is no hub or a similar device present. Also this type is difficult to install and certainly when it has to be reconfigured when a new computer is added to the network...
Words: 817 - Pages: 4
...123 Textiles Company Network Disaster Plan Keith A Manley IT240/ Sorrells 11/30/2012 The 123 Textile Corporation has several solvable issues that we will address in this network updating proposal. They have been exposed to inclement weather and as of late a break in resulting in the companies sever and all pertinent data for sales, production, human resources. This proposal will lay out all necessary hardware upgrades as well as the software upgrades needed to maintain the new hardware. It will also look at off-site back up as a potential resolution to being in an area that may be more susceptible to break-ins resulting in equipment loss and or damage. The proposal will also address the issues of inclement weather and possible protection from natural disasters. Hardware and equipment proposal; A required designated space for the new computer equipment should be around 50 square feet with through wall ventilation but no window or exterior access points. In addition a cable line for modem connection and power source will be required. Power source should be of 20 amp circuit and non GFI, number of circuits at primary location in room to be four. In consideration of power outages that could result in loss of data a recommended solution will be the installation of an online UPS battery backup unit which provides continuous power while plugged in through the unit’s battery allowing for smoother and quicker power transition. This unit provides...
Words: 1340 - Pages: 6