Lan / Wan Research Project

In: Computers and Technology

Submitted By rdkrazy
Words 583
Pages 3
LAN / WAN Research Project

1)
You have just begun working as a networking consultant with MTI Technologies Inc.
One of your first tasks is to help troubleshoot a small Ethernet network at a tax preparation office in the city of Chicago. The backbone of this network consists of six hubs connected in a bus fashion. Three of the hubs service workgroups of 10 workstations each. One of the hubs services two file servers and two shared printers. In anticipation of tax season and a heavier workload, the organization recently upgraded its network from 10BaseT to100BaseT. However, they have not seen any of the performance increases they expected. Before even visiting the firm, what can you suggest as reasons for the less than optimal performance?

I would inform them that they might have a NIC card that is not capable of 100baseT, this would make all the other NIC cards run on 10baseT regardless of it’s capability. I would suggest that they purchase a new NIC card and I would inform them that they need to update their drivers whenever they do upgrades.
2)
The network managers at the tax preparation office have followed your advice on reconfiguring the network, and as a result, the network is now running more smoothly. However, they have realized that their Internet connection is too slow. They have been using a dial-up BRI
ISDN connection. They want to spend no more than $250 per month on an Internet connection
(not including installation fees). They also need a transmission method with fairly good security and a guarantee of adequate throughput during the daytime hours. What solution can you recommend that will offer them the most throughput at this cost?

I would recommend that they purchase a router and upgrade their internet connection to frame-relay PVC at 256 kbps, which would be giving them double the speed they currently have, plus with the…...

Similar Documents

Itm Lan, Man, Wan

...Computer or devices Different types of networks – Major LAN ,WAN, MAN , also can, ban,pan 3rd slide- application- staright forward 4TH SLIDE TOPOLOGY DEFINITION- A TOPOLOGY REPRESENT THE RELATIONSHIP OF ALL THE LINKS & DEVICES. MESH TOPOLOGY- EVERY DEVICE IS CONNECTED TO EVERY OTHER DEVICE VIA DEDICATED POINT TO POINT LINK STAR TOPLOGY- STAR TOPOLGY CONSISTS OF A HUB.ALL THE DEVICES ARE CONNECTED TO THIS HUB.THE DEVICES ARE NOT CONNECTED TO EACH OTHER. BUS TOPOLOGY- ALL DEVICES ARE CONNECTED TO THE LONG CABLE(BACKBONE) USING DROPLINES & TAPS. RING TOPOLGY-EACH DEVICE IS CONNECTED TO THE NEXT DEVICE;WITH THE LAST DEVICE CONNECTED BACK TO THE FIRST DEVICE. 5th slide Lan- * Definition-Computer network that interconnects computers in a limited area (for details refer wiki) * Characteristics- higher data-transfer rates(SPEED), smaller geographic area, and minimum need for leased telecommunication lines. * Technology -Previously ARCNET, Token Ring were used..At present Wifi, Ethernet are being used. * Application-  home, school, computer laboratory 6th slide Advantages- straight forward 7th slide MAN- * Defintion- A MAN usually interconnects a number of local area networks (LANs) using a high-capacity backbone technology. * Characteristic-  Its geographic scope falls between a WAN and LAN. MANs provide Internet connectivity for LANs in a metropolitan region, lower speed than lan. * Technology -High-capacity backbone......

Words: 301 - Pages: 2

Lans and Wans

...hardware and software needed to create and secure the networks. Each location will be set up with its own Wireless local area connection and they will all utilize the Internet to provide a Wide Area connection for the company as a whole. LAN, WAN and Wireless technologies Local Area Networks, or LANs, are a grouping of computers networked together in a generally small geographic area. LAN technology refers to the hardware and software used to create a local area network. The most common wired methods are Ethernet and Token Ring, and WLAN technologies using IEEE 802.11. WAN or Wide Area Network technologies include ATM. TCP/IP, and Frame Relay to connect and transfer data across large distances. Using a cable such as an Ethernet cable computers on a LAN are required to share the network when passing data packets back and forth. Before sending data across the network each computer checks the line for other transmissions. If the line is clear the computer sends the data, if not the computer waits. This method is called CSMA/CD. Wireless LANs or WLANs use RF signals to transmit data across the network. Every computer on a wireless local area network share the same frequency and take turns sending data just like using a cable. Wireless LANs use CSMA/CA to check for an open line of communication to it intended target. The sending device will send out a signal to the receiving device called a Request to Send. If the receiving device is available it will send a clear to......

Words: 1327 - Pages: 6

Lan, Man and Wan

...LAN, MAN and WAN Student Name University Network Telecommunication Professor Name October 21, 2013 LAN, MAN and WAN Computer networking is simply the communication between two or more computers that allow them to share information and hardware resources. This is really one of the most important contributions to the information age since personal computers were invented. The connection and communication of just two computers exchanging data and devices is the most fundamental of networking. The computer systems may communicate over a computer network and share their resources (Computer Network, 2009). A computer network can be wire and or wireless. When a network is wired, it uses cables to connect group of computers together to enable data communication. Wireless networks allow computers to communicate by using radio signals, so the computers aren't restricted by physical cables (Lowe, 2011). For example, it uses bluetooth, infrared rays and radio waves to send and receive signals over the network. Peer-to-peer (p2p) and client-server are the two computer networks in use today. In a p2p network, every computer has the same or equal capabilities and responsibilities. And with a client server it is nothing like peer-to-peer, some computers are the clients that request for resources and the servers make available the requested resources. There are many categories of computer networking, but the most common are local area network (LAN), metropolitan area......

Words: 1265 - Pages: 6

Lan - to - Wan Domain

...Michael Bearcroft Week 4 Lab 2 Part 1 Introduction The LAN-to-WAN Domain provides Internet access for the entire organization and acts as the entry/exit point for the wide area network (WAN). This domain is where all data travels into and out of the IT infrastructure. There are many threats and risks here, as the attack could come from inside the network or it could be trying to get into the network. Threats With this domain as the buffer between two other domains it gets the majority of the traffic through it. Some of the treats, risks, and vulnerabilities are as follows. Threats from people, this could be misconfigured equipment, equipment not being used correctly, unauthorized use, use of personally owned software/hardware. There are also viruses, Trojans, and network worms that can inflict damage on the network. Some of the physical threats are fire, water, electrical disturbances, and hardware failures. Mitigation Here is some of the ways in which the threats to the domain can be mitigated. Security training for the employees, so they will know what to do in specific scenarios. Security training is mandated by the Computer Security Act of 1987, so it’s not just a good idea but a requirement. Strict personnel screening by the HR department will also screen out any personnel that could cause issues in the future. User Identification and authentication is another way to keep the LAN – to – WAN domain safe. Another important safeguard is encryption, if the......

Words: 904 - Pages: 4

Lan, Man and Wan Network Topologies

...network topologies, but the three most common types are LANs, MANs, and WANs. The LAN topology is probably the most common of the three. The MAN and WAN topologies are used but not nearly as much as the LAN topology is, although the WAN is starting to be used more and more because of the growing population of networks. The LAN (Local Area Network) is used so much because it is used in small areas. Small businesses use LANs a great deal because they are small and they wouldnt need a WAN or a MAN because there business is usually ran out of one or maybe two buildings. You will usually find LANs in buildings, schools, and even in homes at times. Some buildings even have multiple LAN's in them for certain purposes. When designing the layout of a LAN, the party can choose from a selection of different technologies on which to base the main part of their LAN. The technology choices that the party adopts will be a critical part in the way their LAN performs. Two important LAN setups are a network based on Ethernet or Token Ring technology. Besides operating in a small space, LANs have some other distinctive features. LANs are typically owned, controlled, and managed by a single person or organization. A WAN (wide area network) goes across large physical distance. Many times a WAN will go almost around most of the world! The most popular WAN is the Internet. The Internet is one big huge WAN and it is also the most used WAN. A WAN is basically a dispersed collection of LAN's.......

Words: 522 - Pages: 3

Acceptable Use Policy for Wan/Lan Access

...Acceptable Use Policy (AUP) for use of WAN/LAN owned and maintained by Richman Investments Statement of Policy: The following Information Technology Acceptable Use Policies and Procedures are to be followed by ALL employees, contractors, vendors, and other authorized individuals who are granted access to any Local Area Network and/or Wide Area Network or other service maintained and provided by Richman Investments or its subsidiaries. It is expected that all departments will enforce these policies. ANY USER FOUND VIOLATING THESE POLICIES OR PROCEDURES WILL FACE PUNISHMENT WHICH MAY INCLUDE DISCIPLINARY ACTION, SERVICE ACCESS TERMINATION, AND/OR LEGAL ACTION. Users of the any Local Area Network and/or Wide Area Network owned and maintained by Richman Investments understand they are subject to monitoring by the Information Technology department in order to maintain systems security and prevent unauthorized access and usage of equipment. Richman Investments assumes no responsibility for actions performed by users which violate any laws, foreign or domestic. If discovered, these users will be reported to the proper authorities for prosecution. Prohibited Use of Equipment or System: * No peer-to-peer file sharing or externally reachable file transfer protocol (FTP) servers * No exporting internal software or technical material in violation of export control laws * No accessing unauthorized internal resources or information from external sources * No......

Words: 339 - Pages: 2

Project Research

...Project Research Paper RES/351 Teyronn Jackson Julie Bonner Project Research Paper Today, there is a growing need for more skilled maintainers to perform maintenance on military aircraft. There are multiple airframes and platforms across the military that are suffering from not having the manpower to support the maintenance needs that are required for the daily upkeep of these sophisticated weapons systems. We intend to address this growing concern by analyzing the needs based on the airframe, type model and series of each platform. Because there are so many different platforms across the different branches of the military, this research will take will be divided into teams of personnel who are designated subject matter experts for performing task that are required to maintain the individual systems of each aircraft. Other items that we intend to address during the process of this research include, but are not limited to unethical behavior and the effects it will have on the individual as well as the organization and society. We will also examine courses of action to be taken to address unethical behavior and what can be done to monitor it so as to prevent it from reoccurring. We intend to deglamorize this behavior as much as possible by addressing it as quickly as possible and encouraging the reporting of any actions that may be a clear indication of unethical behavior during the process of performing this research. Safety should always be paramount while......

Words: 873 - Pages: 4

Lan/Wan

...to pull necessary files. For the phone system we will use VOIP phones to allow all locations to be connected on the same system to allow call transfer. We will then use Barracuda systems for security and backups. We will then use Active directory, to create group policies and add restrictions per site. The 5 main sites will have Servers that will allow additional locations to connect through VPN. Each server will being using barracuda security along with backup systems to secure information. Barracuda will provide Email security Web security Network security Web application security data protection and file sync & share, Barracuda will also provide VOIP services. Our international will be connected WAN to WAN and the locations will be connected LAN to WAN to LAN. We will be using a layered network for when changed are made to the network it does not change all layers but will change the one layer that is to be changed. We will have access layer which connects end users to the network this will be achieved by using a hub to which PCs will be connected. The distribution routing is going to connect to our multiple properties from our central company. We will also be using Scalability which is we can add users and give them additional access layers without having to replace al the distribution and core devices at the same time. It’s much easier to add extended functionality one later at a time as needed instead of all at once. This will be cost efficient......

Words: 565 - Pages: 3

Research Project

...UNIVERSITY OF SUNDERLAND   RESEARCH PROJECT   Research project on how Ninomaxx can attract customers to purchasing its clothing online     Nguyen Thuy Dai Trang   12/19/2014   Words count: 9730       1   TABLE OF CONTENTS I.   ACKNOWLEDGEMENTS:  .....................................................................................................  3   II.   ABSTRACT:  ...............................................................................................................................  4   III.   INTRODUCTION:  ..................................................................................................................  5   IV.   RESEARCH BACKGROUND:  ............................................................................................  6   V.   STATEMENT OF PROBLEM:  ..............................................................................................  9   VI.   RESEARCH OBJECTIVES:  ...............................................................................................  10   VII.   RESEARCH QUESTIONS:  ...............................................................................................  10   VIII.   RESEARCH METHODOLOGY:  ...................................................................................  11   1. RESEARCH APPROACHES:  ................................................

Words: 11253 - Pages: 46

Research Project

...Ministry Of Education and Science of the Republic of Kazakhstan International University of Information Technologies Department of Languages Research Paper Pros and Cons Of Using Escalator Autumn 2015 Done by: Orazaliyev Daulet Group: IS137R Advisor: senior-lecturer Kaldarova A. Almaty, 2015 Abstract This research was designed to know opinions of people related to escalators.  The idea was to introduce and reinforce the importance of escalators usage in our life, is it so necessary. The research ran for about 2 months during the autumn of 2015.  Participants were different persons in a street, were asked some questions about their thoughts escalator in subway. Results show that most of people prefer escalator rather than use stairs. Table of contents I. Introduction 1. Statement of problem II. Body 1. Functions of Escalator 1.1 What is an escalator? 1.2 Application 2. Pros and Cons 2.1 Pros 2.2 Cons III. Conclusion IV. References V. Appendices Introduction The main topic of my research is about pros and cons of using escalator. It is determined by the increased importance of the escalator and its role in our life. As I guess, escalator is the kind of technique which has many advantages, but also it has some harmful impacts. That is why this problem has still being unsolved in many countries. Some years ago, the first subway was opened in Almaty, 2011, dedicated to Kazakhstan’s......

Words: 1323 - Pages: 6

Research Project

...1: Introduction 4 1.1: Objectives of the Survey 4 CHAPTER 2: MATERIALS AND METHODS 5 2.1: DATA MANAGEMENT 5 DATA ANALYSIS 6 CHAPTER 4 14 4.1: Discussion conclusion 14 4.2: Recommendation 14 Acknowledgement 15 References 16 Annexes 17 Annex 1: Questionnaire 17 Annex 2: Permission list 17 ABSTRACT. Gathering feedback from important customers, measuring and periodical comparing of normalized results provide ultimate approach to assure customer satisfaction and loyalty. One approach for measuring customer satisfaction in KEMRI is presented in this paper. Research on customer service, service quality/products, and customer satisfaction, limited empirical evidence exists regarding context specific situations, for example, satisfaction with the customer service of research institutions considering how situations in different parts of Kenya and their cultural backgrounds might determine consumers’ expectations, experience, and conceptualization of customer services.The aim of this study was to find out the satisfaction of customers with KEMRI services and products to point out the most important problems and defects in services, to carry out corrective actions, and thereafter to identify the possible changes in satisfaction. This survey was carried out for a period of 6 months from 26 Feb 2015 to 29 July 2015. Eight core service attributes were identified selected and hence, used to calculated the......

Words: 2200 - Pages: 9

Research Projects

...Research Project for Sport and Exercise Science Research Proposal (1 of 2) EDSE Elen Moyo S0073212 Tom Raynor Assessment due in: 21/10/15 In this project I will be attempting to figure out the effects of eating jelly babies in a 30m sprint, if consuming the substrate will improve speed to the subjects or contradict. The reason why I want to conduct this is that Jelly babies are common taken for boosting energy as it contains a great amount of sugar so by doing this project will gather enough research to prove if jelly babies affects speed on a 30m sprint. Does sugar intake have an effect on speed in a 30m sprint? Aims My aim is to establish the human consumption of sugar intake, if it has an effect of sprinting 30m. Objectives * Booking facilities such as the rubber crumb * Finding equipment’s * To film the 30m sprints, to calculate velocity * Subjects will complete 30m sprint without taking the substrate to start off with * Time of speed will decrease * Results recorded down on a table with each subjects score. Hypothesis * The use of consuming Jelly babies will have no significant difference on the subjects speed as it will not differ. * Subjects speed score will decrease when taking the substrate, compared to when consuming the substrate. Recourses Physical Resources- For my project I will need a stop timer to time the speed the subjects are sprinting. Tape measure that gives the correct......

Words: 1150 - Pages: 5

Research Project

...Research Project According to Alexandra Zavis, Christine Mai-Duc, and Tina Susman in the Lexington Herald Leader, published on October 23, 2014, in the article titled “Canada’s Parliament under Fire”, they cover the story of the recent shooting in Canada’s capital city of Ottawa. This article accurately summarized the events surrounding the instance where a shooter had killed a soldier pulling guard duty at the war memorial, and then proceeded to the foyer of the parliament offices where he was stopped by a hail of gunfire. There were a few things that made this article interesting. One major part that stood out was that Canada’s “high-risk traveler” watch list has 90 people on it (Zavis, Mai-Duc and Susman). This sounds like an awfully low number considering the US probably has thousands. To me it would seem you could afford to assign 90 agents to follow these “high-risk” individuals at all times. This article was a pretty quick and easy read. It was laid out in a good chronological order with added quotes from witnesses in the area which helped it flow well. The facts have been confirmed by numerous sources including those witnesses. Another interesting note is where the soldier who was killed had been identified by a friend who had recognized him in television video of paramedics trying to save his life (Zavis, Mai-Duc and Susman). The audience the authors were targeting is just about everyone who has heard about the shootings and might not have known any of the......

Words: 429 - Pages: 2

Lan Wan

...Local are networks (LAN) is a computer network covering a small geographic area, like a home, office, school, or group of buildings. Has a High speed (1000 mbps) Tends to use certain connectivity technologies, primarily Ethernet and Token Ring. LANs tend to have fewer problems associated with them, as there are smaller numbers of systems to deal with. Wide area network (WAN) is a computer network that covers a broad area. It does have slower speeds of about 150 mbps. WANs tend to use technologies like MPLS, ATM, Frame Relay and X.25 for connectivity over longer distances Differences between (LAN) & (WAN) (LAN) is typically owned and managed by a single company or organization. LAN also experiences fewer data transmission errors and overall fewer problems as a whole as opposed to WAN. WAN has a high cost maintenance and lower bandwidth. In conclusion the major differences are going to be cost, efficiency and coverage Describe common physical topologies and a logical topology : Physical topology refers to how the network is wired it can be either a ring topology where all the hosts are connected together or a bus topology where there is a network medium and each host connects to that medium by wire. A logical topology in the other hand governs how the network is going to work. For example all the hosts in the network are connected through a central connecting point that’s the physical topology however the way the protocols and hardware are designed to......

Words: 273 - Pages: 2

Lan/Wan Networking Project

...Consultant at MTI Technologies Inc (800) XXX – XXXX Ext – 5555 2. The network managers at the tax preparation office have followed your advice on reconfiguring the network, and as a result, the network is running more smoothly. However, they have now realized that their Internet connection is too slow. They have been using a dial-up BRI ISDN connection. They want to spend no more than $200 per month on an Internet connection (not including installation fees). They also need a transmission method with fairly good security and a guarantee of adequate throughput during the daytime hours. What solution can you recommend that will offer them the most throughput at this cost? As you see in this type of situation they are dealing with a LAN a local area network and of course they do not really need anything that is incredibly expensive. The first thing that they want to do is simply get a Router from a telephone company and of course a switch that has about 4 to 5 ports in this case would be super great. After this, they will be easily on the Internet running at great speeds (Please do not forget upgrade your driver cards!!!!!!) ------------------------------------------------- The Internet connection you have selected for the tax preparation firm is working well. Recently, however, they have learned that their firm will be merging with another firm across town (right here in NYC). They need a way to connect the two offices. They have heard about using data lines to......

Words: 681 - Pages: 3