...scalability, operational continuity, and transport flexibility. They are service provider switches that aggregate traffic at the edge of the network. They are cloud-managed access switches that enable virtual stacking of switches. They are campus LAN switches that perform the same functions as Cisco 2960 switches. _______________________________________________________________ 3 Which statement describes a characteristic of Cisco Catalyst 2960 switches? They are best used as distribution layer switches. They are modular switches. New Cisco Catalyst 2960-C switches support PoE pass-through. They do not support an active switched virtual interface (SVI) with IOS versions prior to 15.x. _______________________________________________________________ 4 What are two functions of a router? (Choose two.) It manages the VLAN database. It increases the size of the broadcast domain. It determines the best path to send packets. It controls the flow of data via the use of Layer 2 addresses. It connects multiple IP networks. _______________________________________________________________ 5 Which technology is required when switched networks are designed to include redundant links? link aggregation virtual private networks virtual LANs Spanning Tree Protocol _______________________________________________________________ 6 What is a characteristic of in-band device management? It is used to monitor and make configuration...
Words: 861 - Pages: 4
...their own data and applications. C. saves money when software is shared. D. enables data sharing, increasing efficiency and productivity. Answer: B Reference: Basic Network Anatomy Difficulty: Easy Copyright © 2008 Prentice-Hall. All rights reserved. Chapter 8: Networking and Digital Communication 4. All of the following statements are true EXCEPT: A. Wireless networks are convenient. B. Wireless networks are generally slower than wired LANs. C. Wireless networks use radio transmitters. D. Wireless networks are generally faster than wired networks. Answer: D 5. Reference: Networks Near and Far Difficulty: Moderate A(n) ____________ broadcasts messages to all devices connected to a LAN. A. switch B. port C. hub D. node Answer: C 6. Reference: Networks Near and Far Difficulty: Moderate In a local area network, a ____________ only transmits data to the destination node. A. switch B. port C. hub D. router Answer: A 7. Reference: Networks Near and Far Difficulty: Moderate LAN stands for: A. local area nodes. B. logical arrangement of networks. C. local area...
Words: 3749 - Pages: 15
...Satellite® L670 Series User’s Guide If you need assistance: ❖ Toshiba’s Support Web site pcsupport.toshiba.com ❖ Toshiba Customer Support Center Calling within the United States (800) 457-7777 Calling from outside the United States (949) 859-4273 For more information, see “If Something Goes Wrong” on page 163 in this guide. GMAD00245010 03/10 2 Handling the cord on this product will expose you to lead, a chemical known to the State of California to cause birth defects or other reproductive harm. Wash hands after handling. Model: Satellite® L670 Series Recordable and/or ReWritable Drive(s) and Associated Software Warranty The computer system you purchased may include Recordable and/or ReWritable optical disc drive(s) and associated software, among the most advanced data storage technologies available. As with any new technology, you must read and follow all set-up and usage instructions in the applicable user guides and/or manuals enclosed or provided electronically. If you fail to do so, this product may not function properly and you may lose data or suffer other damage. TOSHIBA AMERICA INFORMATION SYSTEMS, INC. (“TOSHIBA”), ITS AFFILIATES AND SUPPLIERS DO NOT WARRANT THAT OPERATION OF THE PRODUCT WILL BE UNINTERRUPTED OR ERROR FREE. YOU AGREE THAT TOSHIBA, ITS AFFILIATES AND SUPPLIERS SHALL HAVE NO RESPONSIBILITY FOR DAMAGE TO OR LOSS OF ANY BUSINESS, PROFITS, PROGRAMS, DATA, NETWORK SYSTEMS OR REMOVABLE STORAGE MEDIA ARISING OUT OF OR RESULTING FROM THE USE OF THE PRODUCT...
Words: 49328 - Pages: 198
...Chapter 12 WLAN Troubleshooting IN ThIs chApTer, you WILL LeArN AbouT The foLLoWINg: ÛÛ Layer 2 retransmissions NÛ RF interference Multipath Adjacent cell interference Low SNR Mismatched power settings Near/far Hidden node NÛ NÛ NÛ NÛ NÛ NÛ ÛÛ 802.11 coverage considerations NÛ Dynamic rate switching Roaming Layer 3 roaming Co-channel interference Channel reuse/multiple channel architecture Single channel architecture Capacity vs. coverage Oversized coverage cells Physical environment NÛ NÛ NÛ NÛ NÛ NÛ NÛ NÛ ÛÛ Voice vs. data ÛÛ Performance ÛÛ Weather Copyright © 2009 John Wiley & Sons, Inc. Diagnostic methods that are used to troubleshoot wired 802.3 networks should also be applied when troubleshooting a wireless local area network (WLAN). A bottoms-up approach to analyzing the OSI reference model layers also applies to wireless networking. A wireless networking administrator should always try to first determine whether problems exist at layer 1 and layer 2. As with most networking technologies, most problems usually exist at the Physical layer. Simple layer 1 problems such as nonpowered access points or client card driver problems are often the root cause of connectivity or performance issues. Because WLANs use radio frequencies to deliver data, troubleshooting a WLAN offers many unique layer 1 challenges not found in a typical wired environment. The bulk of this chapter discusses the numerous potential problems...
Words: 16450 - Pages: 66
...Introduction We have been hired to deploy a wireless network for Citizens First National Bank. We are going to design, test and deploy this network. Banks have been slow to adapt this technology because if the high security standards they must follow. Since security has been improved and the benefits are so great more and more companies are starting to deploy wireless networks. It the next couple pages I will go through the scope of the project along with the goals and requirements. There are some initial testing that we have to get down and setup so auditors will be able to test before we can deploy to all branches. By using auditors it helps protect the bank with a paper trail incase an incident ever happened. This would show that we have followed all requirements and made every possible attempt to protect our customers and employees. We will have 60 days to setup and test before we have to purchase equipment. This should provide plenty of time to get a location up and running and have their auditors in to do testing. After initial testing we will then put a plan in place to bring all branches online one at a time while sticking to the budget. Scope and Goals Scope The major driving force of this project is to add a wireless infrastructure to the entire bank that would allow seamless use between all branches, while maintaining the high security standards that the FCC requires to help protect the customers and employees of the bank. The details of the...
Words: 786 - Pages: 4
...utilize a Microsoft Visual Studio Team Foundation Service (TFS) server to manage their content and the progress of the project. “Team Foundation is a set of tools and technologies that enable a team to collaborate and coordinate their efforts on building a product or completing a project. Team Foundation enhances team communication, tracks work status, supports team roles, enacts the team process, and integrates team tools.” (Microsoft.com (2011) Team Foundation Overview) In addition to the Team Foundation, they also utilize Visual Studio to code, and build the websites. These resources are accesses through different methods. Those methods include WAN connection, VPN connection through a remote office, and through the corporate office via LAN. They also have other services such as Outlook Web Access for E-mail that is accessed via the methods mentioned above. They have also created security control measures that are published through the corporate security manual. Two Security Vulnerabilities Software Vulnerability The main vulnerability I see on the software side would be protecting their Server. Since Quality Web Design utilizes the access to their servers via remote connection and wireless access, these servers can become victims of Man-in-the-Middle...
Words: 927 - Pages: 4
...Associate Program Material Appendix A Final Project Overview and Timeline Final Project Overview In the final project, you assume the role of a wireless network consultant working for a company called Apex Designs. You must present Apex Designs with a plan that outlines how you intend to design their wireless network. The plan must be based on the recommended steps for designing a WLAN, outlined in the following bulleted list. In addition to the design of the network, Apex Designs has asked that you provide a basic wireless security policy. To that end, your plan must consist of the following elements: • Deployment scenario • IEEE wireless network type • Access point management • Location of wireless devices • Wireless security policy Final Project Timeline Budget your time wisely and work on your project throughout the course. Some of the discussion questions, CheckPoints, and assignments in the course will assist you in creating your final project. If you complete your course activities and use the feedback provided by the instructor, you will be on the right track to complete your project successfully. □ Suggested in Week One: Read the Final Project Overview and Timeline in Appendix A. Review Appendix I and Appendix J. □ Suggested in Week Three: Begin to identify the hardware components that your network may use based on the list of components compiled in the Wireless Network Components assignment. You will not be able to finalize this list...
Words: 446 - Pages: 2
...installs Chanalyzer on your computer 2. Capture1.wsr: First, capture file for analysis 3. Capture2.wsr: Second, capture file for analysis 4. Capture3.wsr: Third, wireless capture file for analysis 5. Capture4.wsr: Fourth, wireless capture file for analysis 3. Install the Chanalyzer spectrum analysis program by double-clicking on the Chanalyzer_Installer.3.4.msi file. 4. Start the Chanalyzer. Once the Chanalyzer is running, open the first capture file, Capture1.wsr, and let the recording run for a few minutes. Using this capture, answer the following questions in your lab report. Question 1: Are any channels being used that overlap other channels? Question 2: If you had to install a new wireless LAN, what channel would you use? 5. Close Capture1.wsr and open the file Capture2.wsr. Let the recording run for a few minutes. Using this...
Words: 855 - Pages: 4
...1. What risk exposure are you subjecting your Microsoft Windows systems to by opening up ports on your internal firewall? Buy opening ports in your firewall it is allowing people access to you network and if anybody that trys to get in figures out the port they can potentially gain access to your system. 2. Using the VM’s on your student workstation, how can you test if your Windows internal firewall is configured properly? By going to start -> control Panel -> Select firewall there it gives you the options that are on Windows Firewall. 3. Name at least three significant risks of logging in to access points in airports, hotels and other public places. Explain. E-commerce involves the passing of sensitive information, like credit card numbers or bank account numbers, over the Internet, and the risk of losing the privacy of this information is high in public places. Theft of unencrypted wireless data can easily occur in public areas because WiFi hotspots do not provide encryption, such as WEP, WPA, or WPA2, in order to simplify the connection process and minimize the management workload. Evil twin hotspot: These are hot spots set up by a hacker and made available to the public. Unknowing users who connect to the Internet using these access points are then exposing their sensitive information to the hacker. To avoid being tricked by this set up, check to see if the login to a WiFi hotspot is SSL encrypted, and look for a valid security certificate...
Words: 300 - Pages: 2
...Aruba Migration Guide 802.11AC MIGRATION GUIDE 802.11ac Aruba Migration Guide Table of Contents Introduction 802.11AC basics Why 802.11ac? 802.11ac technology overview Backward compatibility RF spectrum Multistation MAC throughput > 1 Gbps 256 QAM Wider channels More spatial streams Downlink multi-user MIMO Pros of 802.11ac Cons of 802.11ac Strategy and planning for 802.11ac migration Site planning basics Planning process Minimum requirements and actions to implement 802.11ac Aruba recommendations for 802.11ac migration General Capacity RF planning Installation Wireless RF coverage considerations and questionnaire Summary 3 3 3 4 4 4 5 5 5 5 6 6 6 6 6 6 7 8 8 8 8 8 9 10 Aruba Networks, Inc. 2 802.11ac Aruba Migration Guide Introduction Wi-Fi has become such an amazingly successful technology because it has continuously advanced while remaining backwards compatible. The current state-of-the-art Wi-Fi is known as Wi-Fi CERTIFIED n or 802.11n. 802.11n has become popular because it improves performance. As 802.11n has become a standard interface on PCs, tablets and smartphones, the applications used by these devices have continued to progress. Mobile technology has encountered the next frontier – video. Whether delivering YouTube to smartphones or moving HDTV signals around the office or home, video has become a significant driver of network traffic, chiefly because it requires one or two orders of magnitude more bandwidth than other IP services. Now...
Words: 3787 - Pages: 16
...Wireless Security and Monitoring for the Home Network Raymond Turner Version 1.4b GIAC GSEC Practical Assignment August 21, 2003 Abstract Marketing trends estimate that by the end of 2006, 21 million homes will have implemented a Local Area Network (LAN), and of those 21 million homes 65% will use wireless solutions. [1] The rapidly decreasing cost for wireless devices and the proliferation of wireless solutions provided by the major Internet Service Providers seems to clearly support these growth estimates. Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Home wireless users and security professionals the world over are conceptually trying to solve similar problems. They both need to find a way to provide a secure working environment. There are two distinct approaches to this security dilemma, security prevention, and security detection. An example of security prevention would be a firewall device that restricts specific traffic or ports to or from specific hosts. Although this provides protection against unauthorized traffic, it has no means for determining if an attack is being attempted via an authorized port. An example of security detection would be an IDS (Intrusion Detection System) device that contains a signature to identify a specific attack via authorized or unauthorized ports. [2] Security professionals often have the technology and resources to develop security solutions based on prevention, detection, or a combination of the two. However, home...
Words: 6220 - Pages: 25
...Issue Specific Security Policy Title: Fair and Responsible Use of Wireless LAN Technology Classification: Internal Use Only Statement of Policy This policy addresses fair and responsible use of Acme’s wireless local area network (WLAN) technologies. This includes but is not limited to hardware, software and protocols associated with WLANs. It is intended for authorized users within the Acme enterprise. Authorized users are defined as anyone who has been granted approval to access Acme information and information systems. This includes employees and contingent workers. Authorized users are expected to understand and comply with the contents of this document. Appropriate Use Laptop users are permitted, with prior management approval, to use Acme’s internal WLAN solution. The WLAN should be used only when a wired network solution in unavailable or inappropriate for a particular situation. To ensure appropriate protection of privacy, all wireless transmissions will be secured utilizing strong mutual authentication and encryption. When establishing a connection to a public hotspot or WLAN within your home, a VPN connection must be established and used in conjunction with an Acme approved personal firewall solution. Only Acme approved WLAN technologies are permitted within the enterprise. Use of non-standard hardware, software and protocols is strictly prohibited. Systems Management It is the responsibility of the Network Administrator, for Acme’s WLAN, to...
Words: 472 - Pages: 2
...Vendor | Model | standard | Bands | Encryption Type | Power over Ethernet | WAN Speed | Cost | Netgear | WNDAP330 | 802.11a/b/g/n | Dual 2.4,5GHZ | WEP, WPA, WPA2 | Yes | 10/100/1000BaseT | $329.99 | Linksys | WAP610N | 802.11a/b/g/n | Dual 2.4,5GHZ | WEP, WPA, WPA2 | No | 10/100BaseT | $86.00 | D-Link | DAP-1522 | 802.11a/b/g/n | 2.4 OR 5 GHz | WPA, WPA2, WPA2 Enterprise | Yes | 100/1000 BaseT | $389.99 | Apple | AirPort | 802.11a/b/g/n | Dual 2.4, 5 GHz | Wep, WPA, WPA2 | No | 100/1000 BaseT | $179.00 | TRENDnet | TEW-637AP | 802.11b/g/n | 2.4 | WEP, WPA, WPA2 | NO | 10/100 BaseT | $63.99 | Motorola | AP-5131 | 802.11a/b/g | 2.4 | WPA, WPA2 | No | 10/100 BaseT | $265.00 | Belkin | | 802.11b/g | 2.4 GHz | WEP, WPA, WPA2 | | 10/100 BaseT | $37.00 | For home use I would pick the Linksys. The reason for this is because of the dual band feature. It is always nice to have a wireless access point that can work on both frequencies to support both your old and new wireless equipment. Also with most networking equipment is is always good to go with a company you trust. For the SOHO application I would use the Netgear. This is primary because it is built for commercial use. It supports POE so you can connect a Cat5 from your switch to it and not worry about finding a plugin to power it. Also this access point supports VPN’s and allows the setup of multiple SSID’s to separate out your user. In a business function this is very useful. As the access point I...
Words: 340 - Pages: 2
...TJX companies are known to have a firewall system that does not block any activity that is suspicious on its own networks. Those data encryption that’s used to secure the wireless network at the TJX store outdated. Several of the home wireless networks are secured by using WPA or WPA2. This technology is a lot more complicated to crack. TJX were still using outdated WEP encryption. TJX locations each were lacking those firewalls and data encryption protocols. The company saved the debit and credit card which is also a violation of all card data security standard. The standard was created to reduce any debit and credit card data stored in the merchant systems. Lack of compliance wasn’t intended but the legacy software did not meet the current security standards. The TJX used several available tools to prevent, and limit the impact. Antivirus and the proper firewall software is installed on each machine and is attached to the network should be in place. Security of the wireless networks should have been created to prevent any possible hacks into the system. Data encryption and appropriately secure those passwords to prevent the attack. When there is lack of proper security the TJX companies will have to pay about 11 billion dollar. The banks that provided the cards that were stolen were forced to spend 300 million dollars to replace those stolen cards which are very expensive all because of card information being stolen. TJX responsibility was to make sure that each of the...
Words: 289 - Pages: 2
...used to do the heavy lifting of any network needs. Also this allows an integration of a LAN to be merged openly with the layout of the WLAN when or if necessary. Deployment Scenario Rationale While taking in the consideration of limitations on the physical side. The floor plan inside the Call Center allows WAP to be covered and access the other ones that maybe outside one another. In any area that won’t be high regard for security or even be mobile wire can be used for connections this way the wireless can still connect and the two can communicate. Hardware Components • Component Name: AP o Rationale for using component: to provide coverage wirelessly through out the entire are to be covered. o Rough cost estimate: around $100.00 and above depending on what is to be used • Component Name: switch o Rationale for using component: allows all AP’s to be connected o Rough cost estimate: $50.00 and up • Component Name: Cables o Rationale for using component: restrict access to what is not need to have and to gain access to network. o Rough cost estimate: $5.00 and up depending on length and so on. Insert bullets for additional components IEEE Wireless Network Type Apex Designs has identified that an 802.11n LAN will be implemented. Access Point Management Apex Designs has decided that thin access points will be used to simplify the management of the wireless LAN. These access points allow the wireless network to be managed from one central location...
Words: 334 - Pages: 2