Fundamentals of Local Area Network

In: Computers and Technology

Submitted By iiphanaticx
Words 1210
Pages 5
1. A family wishes to connect several devices to share an Internet connection and a Bluetooth wireless printer. They have three personal computers. One is in the same room as the printer. The other two are together in another room. In addition, they want to utilize the network for television DVR, VoIP phone, and game console. Describe what network device or devices you would recommend they purchase and explain why. Also describe the media utilized. Note, you are not required to detail the topology utilized, but thinking about this will help you to choose and justify your device choices.
a. Describe what network device or devices are recommended for purpose for the given home network scenario(s).

For a family who wishes to connect several devices to share and Internet connection and a Bluetooth wireless printer, I would recommend that family procure a wireless router, a modem, and a few CAT5e Ethernet cables.
b. Explain the recommendations justifying why these would suit the needs for the network

The family has several devices that need internet connectivity; the recommendations I made will make this happen. The modem connects to a wireless router, via plugging the broadband into the WAN port of the router, and the router will access the Internet through a unique IP address (assigned by the ISP). This will then provide local IP addresses for all of the devices connected to it, allowing the family to get Internet out to all of the devices (both wired and wireless). An advantage of having a wireless router is that it provides more safety, compared to connecting your broadband directly to your computer, because your computer's local IP addresses aren’t visible to the Internet, which means it's not visible to criminals or hackers. With all of this said, I would recommend to the family that the modem and wireless router be put into the same room as the computer…...

Similar Documents

Local Area Network

... Step by Step Guide to Setup LAN for Internet Cafe and Homes Creating a Local Area Network is very easy. You can either hire someone to do it for you or do it yourself. In both cases the guide that follows comes handy. It teaches you how setup a LAN for your home or office or Internet cafe. LAN is a network of connected computers and it can be used to organize a LAN party with your friends so you can enjoy multi-player games with them. In business it can help you share files between computers and share a single Internet connection. Other uses of LAN are sharing Internet connection with neighbours and reducing the cost for everyone in the neighbourhood. Requirements: 1) UTP Cat-5 Cables [pic] UTP Cat-5 Cables 2) RJ-45 Connectors [pic] RJ-45 Connectors 3) Crimping tool [pic] Crimping tool 4) Cable stripper [pic] Cable stripper 5) Broadband router [pic] Broadband Router 6) Switch [pic] LAN Switch 1. Choose a central location for the switch and the Broadband router 2. The cables from each outlet will reach the switch so locating the switch along with the router at the center of the network is the best option to save the cable lengths. Place the router and the switch close to each other. 3. Measure the distance of each computer from the switch. 4. Prepare cables to connect the computers with the switch. 1. Cut the required length of the cable. 2. Strip it up to 2 inches with the stripper from one end 3. Arrange the cables......

Words: 924 - Pages: 4

Vlan Virtual Local Area Network

...VLAN Virtual Local Area Network Introduction: A VLAN (Virtual Local Network) is a network of computers that behave as though they are connected to the same wire even though physically they may be located on different segments of the LAN. VLAN are configured through software rather than hardware. This is a big advantage to VLAN because that makes it flexible and when moved physically it can stay on the same VLAN without any hardware configuration. (http://www.webopedia.com) A VLAN has three major functions: 1. Limited the size of broadcast domains. 2. Improves network performance. 3. Provides a level of security. VLAN Switched Port and Configuration: Using a switched VLAN will allow you to create groups of logically network devices that act as though they are on their own independent network. And this includes if they share a common infrastructure with other VLANs. When you configure a VLAN, you must sign it a number ID and you also have the option of name it. The purpose of VLAN implementations is to associate ports with particular VLANs. You configure the port to forward a frame to a specific VLAN. A port can be configured to support these VLAN types: Static VLAN, Dynamic VLAN, and, Voice VLAN. (http://www.orbit-computer-solutions.com) VLAN Trunking: VLAN trunking enables the movement of traffic to different parts of the network configured in a VLAN. A trunk is a point-to-point link......

Words: 572 - Pages: 3

Contrasting Web Browsers and Local-Area Networks

...Browsers and Local-Area Networks Using Quaketail T. Lam Abstract Many electrical engineers would agree that, had it not been for virtual machines, the practical unification of Scheme and semaphores might never have occurred. After years of confirmed research into 802.11 mesh networks, we disconfirm the visualization of SMPs. In our research we verify that operating systems and access points are mostly incompatible. Quaketail is not able to be visualized to manage lambda calculus. The shortcoming of this type of approach, however, is that linked lists and Web services are never incompatible. We emphasize that Quaketail turns the encrypted archetypes sledgehammer into a scalpel. The effect on steganography of this has been adamantly opposed. Combined with metamorphic modalities, it harnesses a Bayesian tool for synthesizing redundancy. Leading analysts continuously analyze the refinement of Internet QoS in the place of redundancy [16] [16]. The shortcoming of this 1 Introduction type of solution, however, is that Byzantine fault tolerance can be made low-energy, cerDistributed configurations and IPv6 have tifiable, and scalable [30, 24]. We emphasize garnered tremendous interest from both in- that our heuristic is NP-complete. Clearly, formation theorists and information theorists Quaketail harnesses 802.11 mesh networks. in the last several years. We emphasize that Here, we make two main contributions. our algorithm simulates the construction of wide-area networks, without......

Words: 2613 - Pages: 11

Local Area Network

...Local Area Networks Vorlesung Prof. Dr. Michael Tüxen Klausurenzusammenfassung • • • • • 2005 2006 2008 2009 2010 Keine Garantie gegen Fehler! Inhalt 1 2 3 OSI Modell .............................................................................................................................................................................................. 4 Schichten angeben und Protokolle SMTP, TCP, IP (IP-Suite) zuordnen. ............................................................................................. 4 Grafische Darstellung der Protokolle ...................................................................................................................................................... 4 Kommunikationsarten ............................................................................................................................................................................ 4 3.1 Anycast .............................................................................................................................................................................................. 4 3.2 Unicast ............................................................................................................................................................................................... 5 3.3 Broadcast .............................................................................................................................................................

Words: 1548 - Pages: 7

Voice over Wireless Local Area Network

...Voice over Wireless Local Area Network In this week’s report I will be discussing how voice traffic is went over a typical wireless local network. I will also provide information on what the advantages to using a wireless network, the problems associated with using a wireless network and what are the best solutions in overcoming these issues. A Wireless Voice network or VoWLAN (Voice over WLAN) is how we send digital voice traffic over a wireless broadband network. The type of wireless set up is basically VoIP sent over a WiFi Access Point. Within the industry this type of VoIP set up is call VoWLAN or WiFi VoIP because it uses the standards set for transporting data by the IEEE 802.11 for wireless technology. In order to use this technology we have to use a VoWLAN enabled device; the most common device on the main stream market is the PDA. There are other devices available like the WiFi handset which looks like a cell phone, but it allows voice data packets sent over the network rather than the normal analog voice signal. One of the other major enterprise level devices is not a device at all. It is software based and is loaded on to a workstation or laptop. This type of software is call softphone. It is a virtual phone that routes call through the WLAN AP to the VoIP gateway or IP PBX. There are some advantages and disadvantages to using this type of technology. One of the major advantages is cost a majority of user have WiFi hotspot available in order to stay connected.......

Words: 661 - Pages: 3

Issc 340: Local Area Network Technologies

...Case Study 2 January 24, 2013 ISSC 340: Local Area Network Technologies American Military University   This document is a proposal for a full network solution to support multiple users and services at the America One Car (AOC) dealership located in Washington DC. The following will include a description of recommended internet service provider (ISP), network cable and infrastructure to include all network equipment, i.e. routers, switches, wireless access points, file and storage server, print server and email server. It also includes the proposed number of network wall drops in each office, the number of phones both VoIP and POTS, total number and type of workstations, and total number and types of printers. This will address the best solution that will meet the company needs while keeping the total cost as low as possible without hindering the network performance. First we will discuss the recommended internet access method and the minimum recommendation for you ISP. The best option for a small business with the possibility of future expansion would be to use a commercial service provider. It is recommended that you use an Ethernet internet that will provide you with a fast, reliable solution that is cost effect and easily upgradable if required. Windstream offers a dedicated Ethernet line with bandwidth speeds up to 1Gbps, having a dedicated Ethernet connection will allow for uninterrupted network access that will not be affected by other users during high......

Words: 1522 - Pages: 7

Auditing Local Area Network

...NIST The purpose of this publication is to provide organizations with recommendations for improving the Security configuration and monitoring of their IEEE 802.11 wireless local area networks (WLANs) and their devices connecting to those networks. The scope of this publication is limited to unclassified wireless networks and unclassified facilities within range of unclassified wireless networks. This publication supplements other NIST publications by consolidating and strengthening their key recommendations, and it points readers to the appropriate NIST publications for additional information (see Appendix C for the full list of references and Appendix A for a list of major security controls relevant for WLAN security). This publication does not eliminate the need to follow recommendations in other NIST publications, such as [SP800-48] and [SP800-97]. If there is a conflict between recommendations in this publication and another NIST wireless publication, the recommendation in this publication takes precedence. NIST Special Publication 800-53 is part of the Special Publication 800-series that reports on the Information Technology Laboratory’s (ITL) research, guidelines, and outreach efforts in information system security, and on ITL’s activity with industry, government, and academic organizations. Specifically, NIST Special Publication 800-53 covers the steps in the Risk Management Framework that address security control selection for federal information systems in......

Words: 1201 - Pages: 5

Cit 245 Entire Course-Local Area Networking Fundamentals

...CIT 245 ENTIRE COURSE-Local Area Networking Fundamentals Click Link Below To Buy: http://hwcampus.com/shop/cit-245-entire-course/ Or Visit www.hwcampus.com CIT 245 ENTIRE COURSE Local Area Networking Fundamentals CIT 245 Week 1 Individual Assignment Using Windows Applications as Network Tools Toolwire® Lab Resource: Toolwire® Complete the Using Windows Applications as Network Tools lab in Toolwire®. Write a summary in one page of the skills performed in the lab and what you learned. In this and in all future weeks, Submit this to Assignments. CIT 245 Week 1 DQS DQ 1 Explain how each of the network topologies are laid out and function, including the various components. Describe how you would determine which model to use. DQ 2 Describe the layers of the OSI model and discuss how functions at each layer impact how you use the network. CIT 245 Week 2 Individual Assignment Observing the TCP Three-Way Handshake Toolwire® Lab Resource: Toolwire® Complete the Observing the TCP Three-Way Handshake lab in Toolwire®. Write a summary in one page of the skills performed in the lab and what you learned. CIT 245 Week 2 Learning Team OSI Model Paper Write a 3- to 5-page paper describing the OSI model. Include the following components in the paper: Purpose and benefits of the OSI model Comparison and contrast of the OSI model to the TCP/IP model Function of each OSI layer Protocols that work at each OSI layer CIT 245 Week 2 DQS DQ 1 Explain how data packets......

Words: 1009 - Pages: 5

Cit 245 Entire Course-Local Area Networking Fundamentals

...CIT 245 ENTIRE COURSE-Local Area Networking Fundamentals Click Link Below To Buy: http://hwcampus.com/shop/cit-245-entire-course/ Or Visit www.hwcampus.com CIT 245 ENTIRE COURSE Local Area Networking Fundamentals CIT 245 Week 1 Individual Assignment Using Windows Applications as Network Tools Toolwire® Lab Resource: Toolwire® Complete the Using Windows Applications as Network Tools lab in Toolwire®. Write a summary in one page of the skills performed in the lab and what you learned. In this and in all future weeks, Submit this to Assignments. CIT 245 Week 1 DQS DQ 1 Explain how each of the network topologies are laid out and function, including the various components. Describe how you would determine which model to use. DQ 2 Describe the layers of the OSI model and discuss how functions at each layer impact how you use the network. CIT 245 Week 2 Individual Assignment Observing the TCP Three-Way Handshake Toolwire® Lab Resource: Toolwire® Complete the Observing the TCP Three-Way Handshake lab in Toolwire®. Write a summary in one page of the skills performed in the lab and what you learned. CIT 245 Week 2 Learning Team OSI Model Paper Write a 3- to 5-page paper describing the OSI model. Include the following components in the paper: Purpose and benefits of the OSI model Comparison and contrast of the OSI model to the TCP/IP model Function of each OSI layer Protocols that work at each OSI layer CIT 245 Week 2 DQS DQ 1 Explain how data packets......

Words: 1009 - Pages: 5

Cit 245 Entire Course-Local Area Networking Fundamentals

...CIT 245 ENTIRE COURSE-Local Area Networking Fundamentals Click Link Below To Buy: http://hwcampus.com/shop/cit-245-entire-course/ Or Visit www.hwcampus.com CIT 245 ENTIRE COURSE Local Area Networking Fundamentals CIT 245 Week 1 Individual Assignment Using Windows Applications as Network Tools Toolwire® Lab Resource: Toolwire® Complete the Using Windows Applications as Network Tools lab in Toolwire®. Write a summary in one page of the skills performed in the lab and what you learned. In this and in all future weeks, Submit this to Assignments. CIT 245 Week 1 DQS DQ 1 Explain how each of the network topologies are laid out and function, including the various components. Describe how you would determine which model to use. DQ 2 Describe the layers of the OSI model and discuss how functions at each layer impact how you use the network. CIT 245 Week 2 Individual Assignment Observing the TCP Three-Way Handshake Toolwire® Lab Resource: Toolwire® Complete the Observing the TCP Three-Way Handshake lab in Toolwire®. Write a summary in one page of the skills performed in the lab and what you learned. CIT 245 Week 2 Learning Team OSI Model Paper Write a 3- to 5-page paper describing the OSI model. Include the following components in the paper: Purpose and benefits of the OSI model Comparison and contrast of the OSI model to the TCP/IP model Function of each OSI layer Protocols that work at each OSI layer CIT 245 Week 2 DQS DQ 1 Explain how data packets......

Words: 1009 - Pages: 5

Cit 245 Local Area Networking Fundamentals Entire Course

...CIT 245 Local Area Networking Fundamentals Entire Course http://homeworklance.com/downloads/cit-245-local-area-networking-fundamentals-entire-course/ CIT 245 Local Area Networking Fundamentals Entire Course This course addresses the fundamentals of local area networking (LAN). Students will learn about Ethernet LANs, wireless LANs (WLAN), and LAN connections. This will include securing the network, transmission control protocol/internet protocol (TCP/IP), troubleshooting switches, WLAN security, and constructing a network address scheme. This undergraduate-level course is 5 weeks. Local Area Networking Fundamentals CIT 245 Week 1 Individual Assignment Using Windows Applications as Network Tools Toolwire® Lab Resource: Toolwire® Complete the Using Windows Applications as Network Tools lab in Toolwire®. Write a summary in one page of the skills performed in the lab and what you learned. In this and in all future weeks, Submit this to Assignments. CIT 245 Week 1 DQS CIT 245 DQ 1 Explain how each of the network topologies are laid out and function, including the various components. Describe how you would determine which model to use. CIT 245 DQ 2 Describe the layers of the OSI model and discuss how functions at each layer impact how you use the network. CIT 245 Week 2 Individual Assignment Observing the TCP Three-Way Handshake Toolwire® Lab Resource: Toolwire® Complete the Observing the TCP Three-Way Handshake lab in......

Words: 1079 - Pages: 5

Cit 245 Entire Course-Local Area Networking Fundamentals

...CIT 245 ENTIRE COURSE-Local Area Networking Fundamentals Click Link Below To Buy: http://hwcampus.com/shop/cit-245-entire-course/ Or Visit www.hwcampus.com CIT 245 ENTIRE COURSE Local Area Networking Fundamentals CIT 245 Week 1 Individual Assignment Using Windows Applications as Network Tools Toolwire® Lab Resource: Toolwire® Complete the Using Windows Applications as Network Tools lab in Toolwire®. Write a summary in one page of the skills performed in the lab and what you learned. In this and in all future weeks, Submit this to Assignments. CIT 245 Week 1 DQS DQ 1 Explain how each of the network topologies are laid out and function, including the various components. Describe how you would determine which model to use. DQ 2 Describe the layers of the OSI model and discuss how functions at each layer impact how you use the network. CIT 245 Week 2 Individual Assignment Observing the TCP Three-Way Handshake Toolwire® Lab Resource: Toolwire® Complete the Observing the TCP Three-Way Handshake lab in Toolwire®. Write a summary in one page of the skills performed in the lab and what you learned. CIT 245 Week 2 Learning Team OSI Model Paper Write a 3- to 5-page paper describing the OSI model. Include the following components in the paper: Purpose and benefits of the OSI model Comparison and contrast of the OSI model to the TCP/IP model Function of each OSI layer Protocols that work at each OSI layer CIT 245 Week 2 DQS DQ 1 Explain how data packets......

Words: 1009 - Pages: 5

Local and Wide Area Networks

...Local Area and Wide Area Networks The complex nature of today’s local and wide area networks requires a great deal of planning before the network can be assembled and configured. Identifying and implementing network security is a key area of concern due to the large variety of network vulnerabilities that can be exploited by both malicious and external users. Additionally, the correct switching and routing technologies must be implemented to ensure the efficiency and availability of the network. A network can reach its peak security and efficiency only when these factors are fully considered and correctly configured in the network. Security Hardware and Software One of the primary concerns in the development of a network is introducing and configuring the proper security hardware and software. One of the primary tools in ensuring the security of a modern network is the implementation of a network firewall. A network firewall is designed to allow or deny packets entry or exit to the network based on user defined rules (Beal, n.d.). Traffic can be allowed or denied entry to the network based on a variety of criteria. Traffic can be inspected and allowed, based on IP, port number, application, or its entry or exit security level (Beal, n.d.). For these reasons the internal network will be guarded by the Cisco ASA 5512-X Firewall. The ASA 5512 firewall provides up to 1Gbps throughput with stateful packet inspection with is sufficient to support the maximum speed of the......

Words: 1253 - Pages: 6

Cit 245 Entire Course-Local Area Networking Fundamentals

...CIT 245 ENTIRE COURSE-Local Area Networking Fundamentals Click Link Below To Buy: http://hwcampus.com/shop/cit-245-entire-course/ Or Visit www.hwcampus.com CIT 245 ENTIRE COURSE Local Area Networking Fundamentals CIT 245 Week 1 Individual Assignment Using Windows Applications as Network Tools Toolwire® Lab Resource: Toolwire® Complete the Using Windows Applications as Network Tools lab in Toolwire®. Write a summary in one page of the skills performed in the lab and what you learned. In this and in all future weeks, Submit this to Assignments. CIT 245 Week 1 DQS DQ 1 Explain how each of the network topologies are laid out and function, including the various components. Describe how you would determine which model to use. DQ 2 Describe the layers of the OSI model and discuss how functions at each layer impact how you use the network. CIT 245 Week 2 Individual Assignment Observing the TCP Three-Way Handshake Toolwire® Lab Resource: Toolwire® Complete the Observing the TCP Three-Way Handshake lab in Toolwire®. Write a summary in one page of the skills performed in the lab and what you learned. CIT 245 Week 2 Learning Team OSI Model Paper Write a 3- to 5-page paper describing the OSI model. Include the following components in the paper: Purpose and benefits of the OSI model Comparison and contrast of the OSI model to the TCP/IP model Function of each OSI layer Protocols that work at each OSI layer CIT 245 Week 2 DQS DQ 1 Explain how data packets......

Words: 1009 - Pages: 5

Cit 245 Local Area Networking Fundamentals Entire Course

...CIT 245 Local Area Networking Fundamentals Entire Course http://homeworklance.com/downloads/cit-245-local-area-networking-fundamentals-entire-course/ CIT 245 Local Area Networking Fundamentals Entire Course This course addresses the fundamentals of local area networking (LAN). Students will learn about Ethernet LANs, wireless LANs (WLAN), and LAN connections. This will include securing the network, transmission control protocol/internet protocol (TCP/IP), troubleshooting switches, WLAN security, and constructing a network address scheme. This undergraduate-level course is 5 weeks. Local Area Networking Fundamentals CIT 245 Week 1 Individual Assignment Using Windows Applications as Network Tools Toolwire® Lab Resource: Toolwire® Complete the Using Windows Applications as Network Tools lab in Toolwire®. Write a summary in one page of the skills performed in the lab and what you learned. In this and in all future weeks, Submit this to Assignments. CIT 245 Week 1 DQS CIT 245 DQ 1 Explain how each of the network topologies are laid out and function, including the various components. Describe how you would determine which model to use. CIT 245 DQ 2 Describe the layers of the OSI model and discuss how functions at each layer impact how you use the network. CIT 245 Week 2 Individual Assignment Observing the TCP Three-Way Handshake Toolwire® Lab Resource: Toolwire® Complete the Observing the TCP Three-Way Handshake lab in......

Words: 1079 - Pages: 5

Friends from College | Alto Adige 01.03.2012 | Economics - 646 Words