...VLAN Virtual Local Area Network Introduction: A VLAN (Virtual Local Network) is a network of computers that behave as though they are connected to the same wire even though physically they may be located on different segments of the LAN. VLAN are configured through software rather than hardware. This is a big advantage to VLAN because that makes it flexible and when moved physically it can stay on the same VLAN without any hardware configuration. (http://www.webopedia.com) A VLAN has three major functions: 1. Limited the size of broadcast domains. 2. Improves network performance. 3. Provides a level of security. VLAN Switched Port and Configuration: Using a switched VLAN will allow you to create groups of logically network devices that act as though they are on their own independent network. And this includes if they share a common infrastructure with other VLANs. When you configure a VLAN, you must sign it a number ID and you also have the option of name it. The purpose of VLAN implementations is to associate ports with particular VLANs. You configure the port to forward a frame to a specific VLAN. A port can be configured to support these VLAN types: Static VLAN, Dynamic VLAN, and, Voice VLAN. (http://www.orbit-computer-solutions.com) VLAN Trunking: VLAN trunking enables the movement of traffic to different parts of the network configured in a VLAN. A trunk is a point-to-point link between...
Words: 572 - Pages: 3
...Local Area and Wide Area Networks The complex nature of today’s local and wide area networks requires a great deal of planning before the network can be assembled and configured. Identifying and implementing network security is a key area of concern due to the large variety of network vulnerabilities that can be exploited by both malicious and external users. Additionally, the correct switching and routing technologies must be implemented to ensure the efficiency and availability of the network. A network can reach its peak security and efficiency only when these factors are fully considered and correctly configured in the network. Security Hardware and Software One of the primary concerns in the development of a network is introducing and configuring the proper security hardware and software. One of the primary tools in ensuring the security of a modern network is the implementation of a network firewall. A network firewall is designed to allow or deny packets entry or exit to the network based on user defined rules (Beal, n.d.). Traffic can be allowed or denied entry to the network based on a variety of criteria. Traffic can be inspected and allowed, based on IP, port number, application, or its entry or exit security level (Beal, n.d.). For these reasons the internal network will be guarded by the Cisco ASA 5512-X Firewall. The ASA 5512 firewall provides up to 1Gbps throughput with stateful packet inspection with is sufficient to support the maximum speed of the networks...
Words: 1253 - Pages: 6
...Step by Step Guide to Setup LAN for Internet Cafe and Homes Creating a Local Area Network is very easy. You can either hire someone to do it for you or do it yourself. In both cases the guide that follows comes handy. It teaches you how setup a LAN for your home or office or Internet cafe. LAN is a network of connected computers and it can be used to organize a LAN party with your friends so you can enjoy multi-player games with them. In business it can help you share files between computers and share a single Internet connection. Other uses of LAN are sharing Internet connection with neighbours and reducing the cost for everyone in the neighbourhood. Requirements: 1) UTP Cat-5 Cables [pic] UTP Cat-5 Cables 2) RJ-45 Connectors [pic] RJ-45 Connectors 3) Crimping tool [pic] Crimping tool 4) Cable stripper [pic] Cable stripper 5) Broadband router [pic] Broadband Router 6) Switch [pic] LAN Switch 1. Choose a central location for the switch and the Broadband router 2. The cables from each outlet will reach the switch so locating the switch along with the router at the center of the network is the best option to save the cable lengths. Place the router and the switch close to each other. 3. Measure the distance of each computer from the switch. 4. Prepare cables to connect the computers with the switch. 1. Cut the required length of the cable. 2. Strip it up to 2 inches with the stripper from one end 3. Arrange the cables in...
Words: 924 - Pages: 4
...NIST The purpose of this publication is to provide organizations with recommendations for improving the Security configuration and monitoring of their IEEE 802.11 wireless local area networks (WLANs) and their devices connecting to those networks. The scope of this publication is limited to unclassified wireless networks and unclassified facilities within range of unclassified wireless networks. This publication supplements other NIST publications by consolidating and strengthening their key recommendations, and it points readers to the appropriate NIST publications for additional information (see Appendix C for the full list of references and Appendix A for a list of major security controls relevant for WLAN security). This publication does not eliminate the need to follow recommendations in other NIST publications, such as [SP800-48] and [SP800-97]. If there is a conflict between recommendations in this publication and another NIST wireless publication, the recommendation in this publication takes precedence. NIST Special Publication 800-53 is part of the Special Publication 800-series that reports on the Information Technology Laboratory’s (ITL) research, guidelines, and outreach efforts in information system security, and on ITL’s activity with industry, government, and academic organizations. Specifically, NIST Special Publication 800-53 covers the steps in the Risk Management Framework that address security control selection for federal information systems in accordance...
Words: 1201 - Pages: 5
...another room. In addition, they want to utilize the network for television DVR, VoIP phone, and game console. Describe what network device or devices you would recommend they purchase and explain why. Also describe the media utilized. Note, you are not required to detail the topology utilized, but thinking about this will help you to choose and justify your device choices. a. Describe what network device or devices are recommended for purpose for the given home network scenario(s). For a family who wishes to connect several devices to share and Internet connection and a Bluetooth wireless printer, I would recommend that family procure a wireless router, a modem, and a few CAT5e Ethernet cables. b. Explain the recommendations justifying why these would suit the needs for the network The family has several devices that need internet connectivity; the recommendations I made will make this happen. The modem connects to a wireless router, via plugging the broadband into the WAN port of the router, and the router will access the Internet through a unique IP address (assigned by the ISP). This will then provide local IP addresses for all of the devices connected to it, allowing the family to get Internet out to all of the devices (both wired and wireless). An advantage of having a wireless router is that it provides more safety, compared to connecting your broadband directly to your computer, because your computer's local IP addresses aren’t visible to the Internet, which means...
Words: 1210 - Pages: 5
...choice of networks against all electronic threats. Networking hardware is hardware that is used to help work stations connect to a server. Although there are many different kinds of hardware like bridges, network cards the networking hardware that I have chosen to use in within my company’s network are routers, firewalls and switches. Using both routers and firewalls will help protect not only wireless networks but also those networks that use Ethernet cabling. I chose this hardware because I felt that it’s the best hardware to use when keeping my company’s network safe. The software that I have chosen to use is McAfee Anti-virus security software. This software along with the firewall will keep my company’s network safe and secure. Routers along with firewalls are the top network security hardware needed when it comes to keeping a network almost if not all totally secure. The firewall blocks out any unwanted activity as well block hackers from possibly hacking into our networks and stealing important information that pertains to our company and its customers. Along with the router and firewall networking software also plays a major part. The software is what the firewall uses to create its security barrier over the network. McAfee is one of the top manufacturers when it comes to network security. This software enables the use of not only the internet’s firewall but also the ability to detect viruses, anti-spyware upon the network, indicates safety of website upon network by color...
Words: 1488 - Pages: 6
...requires newer application with short response times while increasing overall productivity. (Business Data Communications, Sixth Edition, 2009, p. 58). The corporation will have to decide whether they require a LAN, Local Area Network, if the corporation only needs their network to share resources within a building, (Local Area Network Technologies, 2012). The corporation may want to use MAN, Metropolitan Area Network, if they have multiple building that need to share a network. An example would be a college campus. (Metropolitan Area Network, 2012). The information requirement of management leads us to the three points of the initial roll out phase and network security. The points of initial roll out are plan, analyze, and implementation. (eWeek, 2004). The first point of initial roll out is plan. The planning process is a very critical part of the roll out process. During the planning point, this is where the developers have to take in consideration the growth and acceleration of the computer industry and how this growth effects the computing and information service needs for large corporations. The corporate computing world demands environments that “ uses client/server computing with intelligent graphical desktops and workstations, which communicate with local and divisional personal computing with intelligent, graphical desktops and workstations,” (Microsoft Tech Net, 2012). These workstation need to also be able to communicate with the...
Words: 757 - Pages: 4
...architecture. A protocol is a set of rules that defines how a task needs to be completed or accomplished. It is used so that multiple people or computers that are communicating between one another are speaking the same language and are completely understood. This would minimize the possibility of confusion or errors in getting a task completed. One example of a technological protocol is when two or more computers are on a single network. In order to connect to one another they must rely on a protocol to enable them to communicate with one another. The four different types of networks are Backbone, Local area, Wide area and Metropolitan area. The key characteristic of a backbone network is its ability to connect more than one Local area network for a company and allow its users to share their resources. The key characteristic of a Local area network is its size. It has the ability to configure in a small geographical area, such as a room or building. A Wide area network can operate for businesses that may have offices in different geographical areas, like cities,...
Words: 440 - Pages: 2
...INTERNETWORKING INTERNETWORKING Abstract A local area network (LAN) is a communication network that interconnects a variety of data communicating devices within a small geographic area and broadcasts data at high data transfer rates with very low error rates. Since the local area network first appeared in the 1970s, its use has become widespread in commercial and academic environments. It would be very difficult to imagine a collection of personal computers within a computing environment that does not employ some form of local area network. This chapter begins by discussing the basic layouts or topologies of the most commonly found local area networks, followed by the medium access control protocols that allow a workstation to transmit data on the network. We will then examine most of the common local area network products such as Ethernet and token ring. Local Area Networks also called LANs have been a major player in industrialization of computers. In the past 20 or so years the worlds industry has be invaded with new computer technology. It has made such an impact on the way we do business that it has become essential with an ever growing need for improvement. LANs give an employer the ability to share information between computers with a simple relatively inexpensive system of network cards and software. It also lets the user or users share hardware such as Printers and scanners. The speed of access between the computers is lighting fast because the data has a...
Words: 1743 - Pages: 7
...Integrative Network Design NTC 362 Integrative Network Design This project will consist of five different phases totaling a timeline of six months. The first month will be the planning phase. This phase will have a deadline no longer than 30 days. After the first 30 days, the second phase will take into effect, which is the installation phase. This phase will also have a timeline of no more than 30 days. The Third Phase will be the longest phase of a timeline of 60 days. The third phase will be the testing phase. The testing phase is important because this is the troubleshooting phase. Troubleshooting is important to ensuring the new system is running up to optimal standards. The fourth phase will have a deadline of 30 days. The fourth phase is the Training Phase, and our trainers only need a month to convert the needed employees to the new system. The Fifth and Final Stage is our Final Evaluation/Lessons Learned Stage. At this point, the system is at full running operation, and for the last month the system will be ready for a full evaluation. Riordan Manufacturing is a fast growing business, and has grown into a large fortune 1000 company. As they grew into this large company they have been encountering problems with lost or misplaced material. As of now Riordan’s material is manually tracked by paper and pen by employees then entered into a database by an inventory clerk at the end of the day. This is causing them to misplace customer packages resulting in unhappy...
Words: 2910 - Pages: 12
...Introduction to Data Communications 1-2 Outline • Brief history of Data Communications – Communications, Information Systems and the Internet • Data Communications Networks – Network components, network types • Network Models – OSI model, Internet model, transmission via “layers” • Network Standards – Standards making, common standards • Future Trends – Pervasive networking, integration of voice, video, and data, new information services 1-3 Information Age • First Industrial Revolution – Introduction of machinery – New organizational methods – Changed the way people worked • Second Industrial Revolution – Information Age – Introduction of computers – Introduction of networking and data communication – Changed the way people worked again • Faster communication Collapsing Information lag • Brought people together Globalization 1-4 The Collapsing Information Lag Historical developments in electronic communications telegraph sped up the rate and volume of transmission of information 1850 Information took days or weeks to be transmitted 1900 Information transmitted in minutes or hours 1950 2007 large quantities of information transmitted in a fraction of a second growth of telecommunications and especially computer networks Globalization of networks 1-5 Advances in Phone Technology Phone invented 1876 first transcontinental and transatlantic phone connections 1915 1919 Packet-switched Telstar data (Telecommunications...
Words: 1962 - Pages: 8
...Computer Network A computer network is a group of computers that are interconnected by electronic circuits or wireless transmissions of various designs and technologies for the purpose of exchanging data or communicating information between them or their users. Networks may be classified according to a wide variety of characteristics. This article provides a general overview of types and categories and also presents the basic components of a network. Introduction A computer network allows sharing of resources and information among devices connected to the network. The Advanced Research Projects Agency (ARPA) funded the design of the Advanced Research Projects Agency Network (ARPANET) for the United States Department of Defense. It was the first operational computer network in the world.[1] Development of the network began in 1969, based on designs developed during the 1960s. For a history see ARPANET, the first network. Purpose Facilitating communications Using a network, people can communicate efficiently and easily via e-mail, instant messaging, chat rooms, telephony, video telephone calls, and videoconferencing. Sharing hardware In a networked environment, each computer on a network can access and use hardware on the network. Suppose several personal computers on a network each require the use of a laser printer. If the personal computers and a laser are connected to a network, the personal computers users each can access the laser printer on the network, as they need...
Words: 3658 - Pages: 15
...suggestions of what should be included in the Meridian Manufacturing Ltd. security policy over local area networks. A local area network, is a network of personal computers that located in a small geographic area such as office, building, or campus. The Computer Security Act of 1987 assigned the responsibility for developing computer standards and guidance for federal unclassified systems including LANs/WANs. I observed that the file servers that support all LANs sit on a long desk outside mainframe computer room. Controlling access to the server is a basic LAN security issue because sensitive data can be accessed and stolen. The manager retorted that the security access to the file room is restricted to the IT staff and that the keyboards also password protected. The main concern here is that the file servers do sit on the long tables which could bring physical harm to the networks in case the table breaks. Review ITC policy and procedures for using ITS computer equipment for non-official use and evaluate for reasonableness, enforceability and compliance with laws and regulations. Access security rules to ensure the design and structure of access security by verifying IDs used for production jobs are properly defined and verify that the security database is efficiently and efficiently organized from most general to most specific levels of hierarchy. One of the local area networks has a gateway to the WAN. The purpose of which is share data and software exchanges to help facilitate...
Words: 488 - Pages: 2
...Network Design Student Name Course 2 July 2014 Professor Identify hardware and software needed to secure your choice of networks against all electronic threats. A network that helps a workstation to connect with each other is called a Networking hardware. If a company uses both routers and firewall, the company is assured protection of both wireless and cabled networks that are used in the company. Network hardware is suitable in any organization in the keeping of the organizations network safe. In the software part I will choose to use McAfee Anti-virus security software. This software in conjunction with firewall is a sure way of protecting a company. Routers when used along with hardware are the best security hardware needed if the company needs to increase the security of their network to a level where none of the intruders can be able to access it (Radu, 2002). The function of the firewall in an organization is to ensure that all unwanted activities are blocked including hackers that can retrieve important and delicate information of the company. Hacking will be a very dangerous exercise where criminal can access the important information that a company has and use this information in blackmailing the company and its customers. Networking software’s also plays a major role in securing an organizations network security. The software has the capabilities of detecting viruses that may attack an organization and make an organization loose its critical...
Words: 1080 - Pages: 5
...hierarchical databases can be made multimodal, autonomous, and symbiotic, but rather on exploring a linear-time tool for investigating context-free grammar (Undergo). Table of Contents 1) Introduction 2) Architecture 3) Implementation 4) Performance Results 4.1) Hardware and Software Configuration 4.2) Experiments and Results 5) Related Work 6) Conclusion 1 Introduction Unified perfect methodologies have led to many intuitive advances, including voice-over-IP and neural networks. The usual methods for the evaluation of DHTs do not apply in this area. A practical issue in electrical engineering is the refinement of the lookaside buffer. However, IPv7 alone is able to fulfill the need for the exploration of courseware. We disprove that the seminal ambimorphic algorithm for the development of B-trees by Takahashi [2] follows a Zipf-like distribution. But, indeed, DHTs and e-business have a long history of interfering in this manner. Indeed, Lamport clocks and local-area networks have a long history of interacting in this manner. We emphasize that Undergo allows B-trees. It should be noted that our system prevents linear-time methodologies. Obviously, we see no reason not to use unstable methodologies to measure the improvement of the Ethernet. Although such a hypothesis might seem perverse, it is supported by related work in the field. A compelling method to solve this quandary is the exploration of vacuum tubes. We emphasize that Undergo...
Words: 2111 - Pages: 9