...Local are networks (LAN) is a computer network covering a small geographic area, like a home, office, school, or group of buildings. Has a High speed (1000 mbps) Tends to use certain connectivity technologies, primarily Ethernet and Token Ring. LANs tend to have fewer problems associated with them, as there are smaller numbers of systems to deal with. Wide area network (WAN) is a computer network that covers a broad area. It does have slower speeds of about 150 mbps. WANs tend to use technologies like MPLS, ATM, Frame Relay and X.25 for connectivity over longer distances Differences between (LAN) & (WAN) (LAN) is typically owned and managed by a single company or organization. LAN also experiences fewer data transmission errors and overall fewer problems as a whole as opposed to WAN. WAN has a high cost maintenance and lower bandwidth. In conclusion the major differences are going to be cost, efficiency and coverage Describe common physical topologies and a logical topology : Physical topology refers to how the network is wired it can be either a ring topology where all the hosts are connected together or a bus topology where there is a network medium and each host connects to that medium by wire. A logical topology in the other hand governs how the network is going to work. For example all the hosts in the network are connected through a central connecting point that’s the physical topology however the way the protocols and hardware are designed to work...
Words: 273 - Pages: 2
...hardware and software needed to create and secure the networks. Each location will be set up with its own Wireless local area connection and they will all utilize the Internet to provide a Wide Area connection for the company as a whole. LAN, WAN and Wireless technologies Local Area Networks, or LANs, are a grouping of computers networked together in a generally small geographic area. LAN technology refers to the hardware and software used to create a local area network. The most common wired methods are Ethernet and Token Ring, and WLAN technologies using IEEE 802.11. WAN or Wide Area Network technologies include ATM. TCP/IP, and Frame Relay to connect and transfer data across large distances. Using a cable such as an Ethernet cable computers on a LAN are required to share the network when passing data packets back and forth. Before sending data across the network each computer checks the line for other transmissions. If the line is clear the computer sends the data, if not the computer waits. This method is called CSMA/CD. Wireless LANs or WLANs use RF signals to transmit data across the network. Every computer on a wireless local area network share the same frequency and take turns sending data just like using a cable. Wireless LANs use CSMA/CA to check for an open line of communication to it intended target. The sending device will send out a signal to the receiving device called a Request to Send. If the receiving device is available it will send a clear to send...
Words: 1327 - Pages: 6
...LAN, MAN and WAN Student Name University Network Telecommunication Professor Name October 21, 2013 LAN, MAN and WAN Computer networking is simply the communication between two or more computers that allow them to share information and hardware resources. This is really one of the most important contributions to the information age since personal computers were invented. The connection and communication of just two computers exchanging data and devices is the most fundamental of networking. The computer systems may communicate over a computer network and share their resources (Computer Network, 2009). A computer network can be wire and or wireless. When a network is wired, it uses cables to connect group of computers together to enable data communication. Wireless networks allow computers to communicate by using radio signals, so the computers aren't restricted by physical cables (Lowe, 2011). For example, it uses bluetooth, infrared rays and radio waves to send and receive signals over the network. Peer-to-peer (p2p) and client-server are the two computer networks in use today. In a p2p network, every computer has the same or equal capabilities and responsibilities. And with a client server it is nothing like peer-to-peer, some computers are the clients that request for resources and the servers make available the requested resources. There are many categories of computer networking, but the most common are local area network (LAN), metropolitan area network...
Words: 1265 - Pages: 6
...Michael Bearcroft Week 4 Lab 2 Part 1 Introduction The LAN-to-WAN Domain provides Internet access for the entire organization and acts as the entry/exit point for the wide area network (WAN). This domain is where all data travels into and out of the IT infrastructure. There are many threats and risks here, as the attack could come from inside the network or it could be trying to get into the network. Threats With this domain as the buffer between two other domains it gets the majority of the traffic through it. Some of the treats, risks, and vulnerabilities are as follows. Threats from people, this could be misconfigured equipment, equipment not being used correctly, unauthorized use, use of personally owned software/hardware. There are also viruses, Trojans, and network worms that can inflict damage on the network. Some of the physical threats are fire, water, electrical disturbances, and hardware failures. Mitigation Here is some of the ways in which the threats to the domain can be mitigated. Security training for the employees, so they will know what to do in specific scenarios. Security training is mandated by the Computer Security Act of 1987, so it’s not just a good idea but a requirement. Strict personnel screening by the HR department will also screen out any personnel that could cause issues in the future. User Identification and authentication is another way to keep the LAN – to – WAN domain safe. Another important safeguard is encryption, if the information...
Words: 904 - Pages: 4
...Computer or devices Different types of networks – Major LAN ,WAN, MAN , also can, ban,pan 3rd slide- application- staright forward 4TH SLIDE TOPOLOGY DEFINITION- A TOPOLOGY REPRESENT THE RELATIONSHIP OF ALL THE LINKS & DEVICES. MESH TOPOLOGY- EVERY DEVICE IS CONNECTED TO EVERY OTHER DEVICE VIA DEDICATED POINT TO POINT LINK STAR TOPLOGY- STAR TOPOLGY CONSISTS OF A HUB.ALL THE DEVICES ARE CONNECTED TO THIS HUB.THE DEVICES ARE NOT CONNECTED TO EACH OTHER. BUS TOPOLOGY- ALL DEVICES ARE CONNECTED TO THE LONG CABLE(BACKBONE) USING DROPLINES & TAPS. RING TOPOLGY-EACH DEVICE IS CONNECTED TO THE NEXT DEVICE;WITH THE LAST DEVICE CONNECTED BACK TO THE FIRST DEVICE. 5th slide Lan- * Definition-Computer network that interconnects computers in a limited area (for details refer wiki) * Characteristics- higher data-transfer rates(SPEED), smaller geographic area, and minimum need for leased telecommunication lines. * Technology -Previously ARCNET, Token Ring were used..At present Wifi, Ethernet are being used. * Application- home, school, computer laboratory 6th slide Advantages- straight forward 7th slide MAN- * Defintion- A MAN usually interconnects a number of local area networks (LANs) using a high-capacity backbone technology. * Characteristic- Its geographic scope falls between a WAN and LAN. MANs provide Internet connectivity for LANs in a metropolitan region, lower speed than lan. * Technology -High-capacity backbone technology,...
Words: 301 - Pages: 2
...LAN / WAN Research Project 1) You have just begun working as a networking consultant with MTI Technologies Inc. One of your first tasks is to help troubleshoot a small Ethernet network at a tax preparation office in the city of Chicago. The backbone of this network consists of six hubs connected in a bus fashion. Three of the hubs service workgroups of 10 workstations each. One of the hubs services two file servers and two shared printers. In anticipation of tax season and a heavier workload, the organization recently upgraded its network from 10BaseT to100BaseT. However, they have not seen any of the performance increases they expected. Before even visiting the firm, what can you suggest as reasons for the less than optimal performance? I would inform them that they might have a NIC card that is not capable of 100baseT, this would make all the other NIC cards run on 10baseT regardless of it’s capability. I would suggest that they purchase a new NIC card and I would inform them that they need to update their drivers whenever they do upgrades. 2) The network managers at the tax preparation office have followed your advice on reconfiguring the network, and as a result, the network is now running more smoothly. However, they have realized that their Internet connection is too slow. They have been using a dial-up BRI ISDN connection. They want to spend no more than $250 per month on an Internet connection (not including installation fees). They also need a transmission...
Words: 583 - Pages: 3
...network topologies, but the three most common types are LANs, MANs, and WANs. The LAN topology is probably the most common of the three. The MAN and WAN topologies are used but not nearly as much as the LAN topology is, although the WAN is starting to be used more and more because of the growing population of networks. The LAN (Local Area Network) is used so much because it is used in small areas. Small businesses use LANs a great deal because they are small and they wouldnt need a WAN or a MAN because there business is usually ran out of one or maybe two buildings. You will usually find LANs in buildings, schools, and even in homes at times. Some buildings even have multiple LAN's in them for certain purposes. When designing the layout of a LAN, the party can choose from a selection of different technologies on which to base the main part of their LAN. The technology choices that the party adopts will be a critical part in the way their LAN performs. Two important LAN setups are a network based on Ethernet or Token Ring technology. Besides operating in a small space, LANs have some other distinctive features. LANs are typically owned, controlled, and managed by a single person or organization. A WAN (wide area network) goes across large physical distance. Many times a WAN will go almost around most of the world! The most popular WAN is the Internet. The Internet is one big huge WAN and it is also the most used WAN. A WAN is basically a dispersed collection of LAN's. A network...
Words: 522 - Pages: 3
...Clevy Aponte Prof Nossa Dear Taxes-r-Us My name is Clevy Aponte and I have recently started working as a Networking Consultant for MTI Technologies Inc. I am also the person assigned to help your group improve your network. As I was informed, and feel free to correct me, that to improve this network you decided to switch from 10BaseT to 100BaseT, I hope that you know that with this improvement might get a faster service but as a consequence the number of equipment that can be added would be less. But after this change, your network not still satisfying you. My first guess to your problem would be NIC cards, your network might have an NIC card that is not compatible or capable of 100BaseT and this issue won’t let the others run more that 10BaseT. To begin with, I would suggest that you to purchase a new NIC card (Network Interface Card) and also remind you to make sure your drivers are updated whenever an upgrade is done. (This is very important). Before buying a new NIC card for your motherboard you must always update drivers when upgrading anything on a computer the computer never knows automatically unless the software was built that way. The solution can be as easy as going to the website of the original make of your NIC that is attached to the motherboard of the PCI slots and upgrade the drivers for these Thank you very much for the attention; feel free to contact me if any questions or information is needed. I will be on top of your issue until your problem...
Words: 681 - Pages: 3
...Acceptable Use Policy (AUP) for use of WAN/LAN owned and maintained by Richman Investments Statement of Policy: The following Information Technology Acceptable Use Policies and Procedures are to be followed by ALL employees, contractors, vendors, and other authorized individuals who are granted access to any Local Area Network and/or Wide Area Network or other service maintained and provided by Richman Investments or its subsidiaries. It is expected that all departments will enforce these policies. ANY USER FOUND VIOLATING THESE POLICIES OR PROCEDURES WILL FACE PUNISHMENT WHICH MAY INCLUDE DISCIPLINARY ACTION, SERVICE ACCESS TERMINATION, AND/OR LEGAL ACTION. Users of the any Local Area Network and/or Wide Area Network owned and maintained by Richman Investments understand they are subject to monitoring by the Information Technology department in order to maintain systems security and prevent unauthorized access and usage of equipment. Richman Investments assumes no responsibility for actions performed by users which violate any laws, foreign or domestic. If discovered, these users will be reported to the proper authorities for prosecution. Prohibited Use of Equipment or System: * No peer-to-peer file sharing or externally reachable file transfer protocol (FTP) servers * No exporting internal software or technical material in violation of export control laws * No accessing unauthorized internal resources or information from external sources * No port...
Words: 339 - Pages: 2
...How To Use Chopsticks Will you eat a sandwich with a spoon or use a fork to have an ice cream? No? Why? Because every food, to taste better, must be consumed using the right vessels and cutlery! Same is the case with Chinese and Japanese foods which seem to taste better when eaten with chopsticks. The origin of chopsticks can be dated back to China, around 3000 to 5000 years ago. Widely used in Japan, China, Korea and Vietnam to eat all kinds of foods, most of the chopsticks are made of bamboo while some are also made of ivory, plastic, silver and jade. They are considered as extensions of the fingers and are considered much better than spoons and forks in their usage. Although the respective Asian communities use chopsticks as effortlessly and naturally as Europeans use forks, it doesn’t really come that easily for the rest of us. Despite the fact that most of the world thinks of them as impossible feats, chopsticks actually provides your hands with a physical affinity with the food — something that our quintessential spoons, forks and knives can never boast of. Having said that, we also acknowledge that eating with chopsticks could require some training and hence the next section that talks about how to use chopsticks. Eating With Chopsticks * Clasp one chopstick between your thumb and middle finger. The chopstick must be in such a position that it is placed at the base of your thumb and at the lower joint of the middle finger. While the bottom chopstick remains intact...
Words: 8121 - Pages: 33
...– THREAT - VULNERABILITY | PRIMARY DOMAIN IMPACTED | Unauthorized access from public Internet | LAN –WAN | User destroys data in application and deletes all files | USER | Hacker penetrates your IT infrastructure and gains access to you internal network | SYSTEM APPLICATION | Intra-office employee romance gone bad | USER | Fire destroys primary data center | LAN | Communication circuits outages | WAN | Workstation OS has a known software vulnerability | LAN – WAN | Unauthorized access to organization owned | USER | Workstations | USER | Loss of production data | SYSTEM APPLICATION | Denial of Service attack on organization e-mail Server | LAN – WAN | Remote communications from home office | REMOTE ACCESS | LAN server OS has a known software vulnerability | LAN | User downloads an unknown e-mail attachment | USER | Workstation browser has software vulnerability | WORKSTATION | Service provider has a major network outage | WAN | Weak ingress/ egress traffic filtering degrades Performance | LAN – WAN | User inserts CDs and USB hard drives with personal photos, music, and videos on organization owned computers | USER | VPN tunneling between remote computer and ingress/egress router | REMOTE ACCESS | WLAN access points are needed for LAN connectivity within a warehouse | LAN – WAN | Need to prevent rogue users from unauthorized WLAN access | WAN | LAB ASSESSMENT QUESTIONS 1. Unauthorized access to organization owned, because if there...
Words: 307 - Pages: 2
...language or set of rules is known as protocol. Protocols and standardization among devices allows for seamless, efficient, and productive communication as well as data transmission and file sharing. The future growth potential for Kudler Fine Foods has initiated a need for converting the current wired Ethernet LAN locations to wireless LANs. In order to do this new hardware, such as WLAN controllers and wireless access points, will be required. In addition to the protocols that the networks already use to communicate- several new protocols will be introduced. The lightweight access point protocol (LWAPP) is one example of a protocol that will be used in addition to the protocols associated with the 802.11n media controls used by the wide area network (WAN) and the IEEE 802.3u standards used by the 100 Base T Ethernet wired cable now in use (“What is Ethernet? Webopedia”, 2015). Converting to the wireless LAN environment will require a few changes in the overall architecture of the network; however, most of the hardware devices that are currently being used will not have to be replaced. As of now, the dedicated lines that connect the three locations are sufficient for the WAN; and, the POS terminals and user terminals are up-to-date. These devices will only require software installization and will also need to be properly configured to be a part of the WLAN environment. The addition of the wireless access points will allow greater flexibility and ease where future growth of...
Words: 598 - Pages: 3
...CHAPTER 4 1. Why is a focus on information systems insufficient in networking? Because the network professionals often has to focus on the broader business system in which the information system is embedded. 2. Compare trends in network demand and network budgets. The network demand is likely to grow rapidly in the future, just as it has always done in the past. The network budgets are growing very slow 3. What are QoS metrics? (Do not just spell out the acronym.) QoS metrics stands for quality-of-service metrics that is metrics that is quantitative measures of network performance. For instance, companies use QoS metric to quantify their quality of service so that they can set targets and determine if they have met those taargets 4. a. In what units is transmission speed normally measured? Speed measured in factor of 1,000 not 1024 b. Is speed normally measured in bits per second or bytes per second? Bits per second c. Give the names and abbreviations for speeds in increasing factors of 1,000. Kbps: kilobits per second- 1,000 bps Mbps: megabits per second- 1,000 kbps Gbps: gigabits per second- 1,000 Mbps Tbps: terabits per second- 1,000 Gbps d. What is 55,000,000,000 bps with a metric prefix? 55Gbps e. Write out 100 kbps in bits per second (without a metric prefix). 100, 000 bps f. Write the following speeds properly: 0.067 Mbps, 23,000 kbps, and 48.62Gbps...
Words: 5126 - Pages: 21
...& Security Description The Senior Network Engineer’s role is to ensure the stability and integrity of in-house storage, virtualization, data, and wireless network services. In addition, the Network Engineer is responsible for the configuration, installation, monitoring, maintenance, upgrade patching and associated troubleshooting of Roxbury Community College systems and network infrastructures. This individual will also analyze and resolve network hardware and software problems in a timely and accurate fashion, and provide end user training where required. Responsibilities Performs daily network maintenance and management of network resources including servers, storage, virtualization, routers and switches Deploy company LANs, WANs, and wireless networks, including servers (rack and blade), storage, routers, switches, and other hardware Configure networks and systems to ensure their smooth and reliable operation for fulfilling business objectives and processes Monitor performance and troubleshoot problem areas as needed Create and maintain documentation as it relates to network configuration, systems, processes, and service records Ensure network connectivity of all servers, workstations, telephony equipment, and other network appliances Conduct research on network products, services, protocols, and standards to remain abreast of developments in the technology industry * Monitor and test network performance and provide network performance statistics and...
Words: 467 - Pages: 2
...Determining Databases and Data Communications Determining Databases and Data Communications Having a clear understanding of the technologies to implement is an incredible tool for managing companies with computer technology as their primary means of sustainability. This knowledge helps their personnel responsible for information management to make informed decisions about which technology to actually implement. These strategic decisions permit the manager to effectively utilize time and resources in seemingly intimidating tasks. This is shown in both scenarios. In the first scenario a marketing assistant working at a consumer electronics company is tasked with maintaining booths for trade shows from start to finish. In addition that individual is also tasked to resolve any issues related to product shipment that may arise. Knowing what information is to be retained is important in ensuring best tools are used in trade fairs. Situations like these calls for detailed list of displays, equipment, and booths that are necessary and how they are being shipped and retrieved. Let’s say a trade show is to be organized in San Antonio, Texas with a requirement of one booth and display. The marketing assistant must make sure the booth with display is brought to the location in time and taken back for future use to the company. With knowing the delivering postal tracking number, a tab can be kept on the dispatch and retrieval date. Every trade show typically needs certain...
Words: 1031 - Pages: 5