...Latam in its internationalization process, first as Lan Chile (Chile) and TAM SA (Brazil). The basis on which this process takes place is not only the enabling environment that has offered Latin America in the last 20 years in economic stability and growth, are also given in the context of privatizations, deregulation in various aspects of the economies of the region, openness to international trade and policies gradually adopted by most economies in the region, with flexible exchange rates, mostly autonomous central banks acting under inflation targeting and counter-cyclical fiscal policy, all this in accordance with the acceptance the so-called "Washington Consensus". LAN’s raising and its expansive through Latin America. LAN Chile born as a state enterprise in 1929. In 1946 opens its first international route to Buenos Aires; in 1956 it expanded its operations to Lima; Miami in 1958 and in 1970 to Europe. After a privatization process is consolidated locally in Chile, then position in Latin America and assist its internationalization. In 1985 the government of the time transformed the company into a public limited company to start its privatization. In 1989 the sale of 51% to domestic investors and SAS (Scandinavian Airlines System) is specified, until in 1994 the Chilean government sold all the shares held by it, at Piñera and Cueto group become owners LAN majority. The business starts a second phase in 1997 when LAN acquires 99.5% stake in the Chilean airline LADECO...
Words: 3899 - Pages: 16
...SEMINAR REPORT ON WIRELESS LAN SECURITY Contents: I. Introduction…………………………………………………………………1 II. Wireless LAN Deployment……………………………………………7 III. Wireless LAN Security Overview…………………………………10 IV. Protecting Wireless LANs…………………………………………...13 V. Wireless LAN Security Summary……………………………………18 I. Introduction a. The 802.11 Wireless LAN Standard In 1997, the IEEE ratified the 802.11 Wireless LAN standards, establishing a global standard for implementing and deploying Wireless LANS. The throughput for 802.11 is 2Mbps, which was well below the IEEE 802.3 Ethernet counterpart. Late in 1999, the IEEE ratified the 802.11b standard extension, which raised the throughput to 11 Mbps, making this extension more comparable to the wired equivalent. The 802.11b also supports the 2 Mbps data rate and operates on the 2.4GHz band in radio frequency for high-speed data communications As with any of the other 802 networking standards (Ethernet, Token Ring, etc.), the 802.11 specification affects the lower layers of the OSI reference model, the Physical and Data Link layers. The Physical Layer defines how data is transmitted over the physical medium. The IEEE assigned 802.11 two transmission methods for radio frequency (RF) and one for Infrared. The two RF methods are frequency hopping spread-spectrum (FHSS) and direct sequence spread-spectrum (DSSS). These transmission methods operate within the ISM (Industrial, Scientific, and Medical) 2.4 GHz band for unlicensed use...
Words: 4933 - Pages: 20
...Issue Specific Security Policy Title: Fair and Responsible Use of Wireless LAN Technology Classification: Internal Use Only Statement of Policy This policy addresses fair and responsible use of Acme’s wireless local area network (WLAN) technologies. This includes but is not limited to hardware, software and protocols associated with WLANs. It is intended for authorized users within the Acme enterprise. Authorized users are defined as anyone who has been granted approval to access Acme information and information systems. This includes employees and contingent workers. Authorized users are expected to understand and comply with the contents of this document. Appropriate Use Laptop users are permitted, with prior management approval, to use Acme’s internal WLAN solution. The WLAN should be used only when a wired network solution in unavailable or inappropriate for a particular situation. To ensure appropriate protection of privacy, all wireless transmissions will be secured utilizing strong mutual authentication and encryption. When establishing a connection to a public hotspot or WLAN within your home, a VPN connection must be established and used in conjunction with an Acme approved personal firewall solution. Only Acme approved WLAN technologies are permitted within the enterprise. Use of non-standard hardware, software and protocols is strictly prohibited. Systems Management It is the responsibility of the Network Administrator, for Acme’s WLAN, to...
Words: 472 - Pages: 2
...LAN Operating Systems Scenarios Read the three scenarios below and answer the questions that follow each scenario. 1. You are the network administrator for a new company that has 10 users and that plans to add 5 more users within a year. The files need to be accessed by all 10 users, and each user must have different security rights. What kind of network would you install? How would the pieces and components of this network relate to each other? Define each component. 1.2. I would install a client/server network on a local area network (LAN). Every computer connected to the network would have a network interface card (NIC) and through the use of Ethernet cables, connect to the company server. Users would be able to store files and share company resources through the server. Implementing a Windows based operating system on the server will allow for the network administrator to assign different security rights and privileges to different users. I think that for this particular situation I would set up an extended star network. I would choose this one because the business is relatively small and plans to grow, this type of network setup is very easy to add users onto and also still provides the access restriction needed for lower level employees and the ease of access for higher level employees without them being able to see what the other is able to access. “As the name implies, this topology is a star of stars. A central device, usually a switch, sits in the middle...
Words: 583 - Pages: 3
...Local are networks (LAN) is a computer network covering a small geographic area, like a home, office, school, or group of buildings. Has a High speed (1000 mbps) Tends to use certain connectivity technologies, primarily Ethernet and Token Ring. LANs tend to have fewer problems associated with them, as there are smaller numbers of systems to deal with. Wide area network (WAN) is a computer network that covers a broad area. It does have slower speeds of about 150 mbps. WANs tend to use technologies like MPLS, ATM, Frame Relay and X.25 for connectivity over longer distances Differences between (LAN) & (WAN) (LAN) is typically owned and managed by a single company or organization. LAN also experiences fewer data transmission errors and overall fewer problems as a whole as opposed to WAN. WAN has a high cost maintenance and lower bandwidth. In conclusion the major differences are going to be cost, efficiency and coverage Describe common physical topologies and a logical topology : Physical topology refers to how the network is wired it can be either a ring topology where all the hosts are connected together or a bus topology where there is a network medium and each host connects to that medium by wire. A logical topology in the other hand governs how the network is going to work. For example all the hosts in the network are connected through a central connecting point that’s the physical topology however the way the protocols and hardware are designed to work...
Words: 273 - Pages: 2
...LAN Topologies Jason Smith IT/240 September 7 2014 TAMMY FLEMONS LAN Topologies Case Project 2-1 You have been hired to upgrade a network of 50 computers currently connected to 10 Mbps hubs. This long-overdue upgrade is necessary because of poor network response time caused by a lot of collisions occurring during long file transfers between clients and servers. How do you recommend upgrading this network? What interconnecting devices will you use, and what benefit will you get from using these devices? Write a short memo describing the upgrade and, if possible, include a drawing of the new network. This system ought to have a central server that can control approaching and cordial transmissions. A central server would prevent the whole system from being hindered due to information parcels being sent and acquired. What's more, the center points ought to be moved up to handle 1000 Mbps. The following is a sample of what a littler variant would look like. I think I would use the physical star topology for this setup. Case Project 2-2 Two hundred workstations and four servers on a single LAN are connected by a number of switches. You’re seeing an excessive number of broadcast packets Throughout the LAN and want to decrease the effect this broadcast traffic has on your network. What steps must you take to achieve this goal? Utilizing an expanded star topology would diminish the impacts of the telecast...
Words: 677 - Pages: 3
...hardware and software needed to create and secure the networks. Each location will be set up with its own Wireless local area connection and they will all utilize the Internet to provide a Wide Area connection for the company as a whole. LAN, WAN and Wireless technologies Local Area Networks, or LANs, are a grouping of computers networked together in a generally small geographic area. LAN technology refers to the hardware and software used to create a local area network. The most common wired methods are Ethernet and Token Ring, and WLAN technologies using IEEE 802.11. WAN or Wide Area Network technologies include ATM. TCP/IP, and Frame Relay to connect and transfer data across large distances. Using a cable such as an Ethernet cable computers on a LAN are required to share the network when passing data packets back and forth. Before sending data across the network each computer checks the line for other transmissions. If the line is clear the computer sends the data, if not the computer waits. This method is called CSMA/CD. Wireless LANs or WLANs use RF signals to transmit data across the network. Every computer on a wireless local area network share the same frequency and take turns sending data just like using a cable. Wireless LANs use CSMA/CA to check for an open line of communication to it intended target. The sending device will send out a signal to the receiving device called a Request to Send. If the receiving device is available it will send a clear to send...
Words: 1327 - Pages: 6
...LAN Topologies Lord Bones IT240 Jan 01, University of Phoenix - AXIA College LAN Topologies With this assignment I will discuss some topologies of a LAN as requested by questions 11, 12, and 13, chapter three from the textbook Local Area Networks. A “LAN (Local Area Network) topology is the appearance or layout of a network” (Regan, 2006). There are two forms of topologies of a network, namely, the physical- and logical topology with each its own types of topologies. The physical topology is what someone can see with his or her own eyes, i.e. a workstation, servers, cables, etc. while the logical topology is the dataflow of the network, how the data is moving from one point to another (Regan, 2006). In the following I will describe two physical topology types and one logical topology type, following the scenarios in the question’s mentioned above. In the first scenario there are four servers in the network with no hub present. The first (A) server is connected to the second (B), third (C), and the fourth (D). The second is connected to the third and fourth, while the third is connected to the fourth. (See figure 1.) This type of physical topology is called a Mesh Topology. A Mesh Topology is a topology where “every computer is linked to every other computer” (Regan, 2006). With this type of topology there is no hub or a similar device present. Also this type is difficult to install and certainly when it has to be reconfigured when a new computer is added to the network...
Words: 817 - Pages: 4
...LAN Topologies IT240 10/14/12 1. Case Project 2-1 With a network of 50 computers I will use the Ring Topology to upgrade this network. With this type of topology all the devices are connecting in a loop form and the information travels in one direction, thus avoiding collisions. Here the cabling doesn’t terminate, it continually goes from one device to another till it gets back to the original device. It is also easier to manage the network since all the information is passed around the ring in the same direction. 2. Case project 2-2 With that many computer and four servers, I will use an Extended Star Topology. As pointed out in the case project that there are a few switches available here, I will use a central switch and connect the rest of the available switches to it and connect the 200 PC’s to those switches. Switches are good for determining each individual packet’s destination and ensuring that they are delivered to the right device. Note Even though they might have two different uses in some cases, the hubs in my diagram represent the switches. 3. Case project 2-3 * Physical versus logical topology: A physical topology defines how the devices on a particular network are physically connected; logical on the contrast tells us how the systems on the...
Words: 415 - Pages: 2
...roduct Description LAN Switching and Wireless CCNA Exploration Labs and Study Guide Allan Johnson LAN Switching and Wireless, CCNA Exploration Labs and Study Guide is designed to help you learn about and apply your knowledge of the LAN switching and wireless topics from Version 4 of the Cisco® Networking Academy® CCNA® Exploration curriculum. Each chapter contains a Study Guide section and a Labs and Activities section. Study Guide The dozens of exercises in this book help you learn the concepts and configurations crucial to your success as a CCNA exam candidate. Each chapter is slightly different and includes matching, multiple-choice, fill-in-the-blank, and open-ended questions designed to help you Review vocabulary Strengthen troubleshooting skills Boost configuration skills Reinforce concepts Research topics Packet Tracer Activities—This icon identifies exercises interspersed throughout the Study Guide section where you can practice or visualize a specific task using Packet Tracer, a powerful network simulation program developed by Cisco. Labs and Activities The Labs and Activities sections begin with a Command Reference table and include all the online curriculum labs to ensure that you have mastered the practical skills needed to succeed in this course. Hands-On Labs—This icon identifies the hands-on labs created for each chapter. Work through all the Basic, Challenge, and Troubleshooting labs as provided to gain a deep understanding...
Words: 339 - Pages: 2
...transfers between clients and servers. How do you recommend upgrading this network? What interconnecting devices will you use, and what benefit will you get from using these devices? Write a short memo describing the upgrade and, if possible, include a drawing of the new network. This network should have a central server that can control incoming and outgoing transmissions. A central server would stop the entire network from being bogged down because of data packets being sent and received. In addition, the hubs should be upgraded to handle 1000 Mbps. Below is an example of what a smaller version would look like. Case Project 2-2 Two hundred workstations and four servers on a single LAN are connected by a number of switches. You’re seeing an excessive number of broadcast packets throughout the LAN and want to decrease the effect this broadcast traffic has on your network. What steps must you take to achieve this goal? Ideally it’s preferable to probably split it up into one or more workstation subnets (based on say, departments) and then another subnet (or more for a larger enterprise) for the servers. Traffic between the subnets will be routed. This means the broadcasts from workstations won't hamper the servers and vice versa. Case Project 2-3 In Chapter 3, you learn about network topologies and technologies. As preparation, do Internet research on the following topics: ● Physical versus logical topology ● Bus topology ● Star topology ● Ring topology ● Ethernet...
Words: 749 - Pages: 3
...LAN Emulation Overview This overview gives a high-level description of LAN Emulation (LANE). LAN Emulation (LANE) Implementation of LANE makes an ATM interface look like one or more Ethernet interfaces. LANE is an ATM service defined by the ATM Forum specification LAN Emulation over ATM, ATM_FORUM 94-0035. This service emulates the following LAN-specific characteristics: • Connectionless services • Multicast services • LAN media access control (MAC) driver services LANE service provides connectivity between ATM-attached devices and connectivity with LAN-attached devices. This includes connectivity between ATM-attached stations and LAN-attached stations and also connectivity between LAN-attached stations across an ATM network. Because LANE connectivity is defined at the MAC layer, upper protocol layer functions of LAN applications can continue unchanged when the devices join emulated LANs. This feature protects corporate investments in legacy LAN applications. An ATM network can support multiple independent emulated LAN networks. Membership of an end system in any of the emulated LANs is independent of the physical location of the end system. This characteristic enables easy hardware moves and location changes. In addition, the end systems can also move easily from one emulated LAN to another, whether or not the hardware moves. LAN emulation in an ATM environment provides routing between emulated LANs for supported routing protocols and high-speed,...
Words: 896 - Pages: 4
...LAN Consulting Plan IT/240 February 26, 2012 James (Garrett) Miller LAN Consulting Plan Data Assurance: 1. Backup system: a. Type? Backup of data will be done with the Norton 360 version 6.0 antivirus protection suite provided backup utility, Symantec Backup Exec. There are two types of backup for this network. The first is a digital tape drive backup that is located on site for intermediate recovery based on the disaster conditions. The second backup is a mirror backup on a bank of servers at an external site to ensure the security of the data in the case of total disaster of the network site. b. Backup Schedule? The backup schedule will be determined by the importance of the information. Business critical information will be backed up at the completion of the task. A scheduled mirror backup will be done daily during the off business hours. c. Backup Data Storage plan? The first backed up data will be stored on an independent server drive using RAID at the main site location for ease of access in the case of an independent component failure. The second backup will be also use RAID and be stored at a different graphical location than the network. Data Integrity: 1. Antivirus system: a. Type? Norton 360 version 6.0 antivirus program is installed at each geographical location including the offsite backup of the network. This security protection will provide virus protection, spyware protection, and scan incoming and outgoing e-mail...
Words: 1841 - Pages: 8
...LAN Topologies LAN Topologies Ashley Jones University of Phoenix Case Project 2-1 This Case Project explains a network comprised of 50 computers that are connected to 10 Mbps hubs. It goes on to explain the collisions that are occurring when multiple stations send data simultaneously. This description indicates the network is using a logical bus topology because of the 10 Mbps hubs it utilizes. In addition, they are experiencing collisions; in a logical bus topology, data transmitted on the network is viewable by other nodes. The physical topology of this network seems to be an extended star. Since a multiport repeater/hub can have up to 24 ports, they can lay this network out in many different ways. If there is enough office space, they could set up 5 different offices of 10 stations. Each set of 10 would be connected to one 10 Mbps hub and form a physical star. Each of these hubs can be connected to a central hub that is used to extend the network. Case Project 2-2 This Case Project advises of a network that has 200 workstations and four servers connected by multiple switches. The network incorporates a physical star topology because all of its devices come together at a central location. More specifically, this exended star topology allows about 20 workstations to connect to one switch. This setup is repeated multiple times, all with 20 workstations connected. Another switch sits in the “center” of this setup and attaches to one of the switch ports...
Words: 350 - Pages: 2
...1. You are the network administrator for a new company that has 10 users and that plans to add 5 more users within a year. The files need to be accessed by all 10 users, and each user must have different security rights. What kind of network would you install? How would the pieces and components of this network relate to each other? Define each component. You'd want a client-server environment using Active Directory possibly with a file server. A. Server to handle logon/authentication. Most likely Windows Server, with Active Directory. B. File server; a computer attached to a network that has the primary purpose of providing a location for shared disk access C. The administrator will create security groups based on departments. D. The administrator will create a Shared Drive directory structure where EACH folder represents a department: This way as you add your 5 more employees, you simply add them to the necessary security group which automatically grants them access to the corresponding shared drive. 2. You are the network administrator for a company that has a peer-to-peer network. How would the pieces and components of this network relate to each other? Define all the components of this type of network. In general, office and home P2P networks operate over Ethernet and employ a hub-and-spoke topology. Category 6e copper wire runs among the PCs and an Ethernet hub or switch, enabling users of those networked PCs access to one another's...
Words: 530 - Pages: 3