Preview

Appendix B Lan Operating Systems Scenarios Essay Example

Good Essays
Open Document
Open Document
803 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Appendix B Lan Operating Systems Scenarios Essay Example
Axia College Material
Appendix B

LAN Operating Systems Scenarios

Read the three scenarios below, then answer the questions that follow each scenario.

1. You are the network administrator for a new company that has 10 users and plans to add five more users within a year. The files need to be accessed by all 10 users and each user must have different security rights. What kind of network would you install and how would the pieces and components of this network relate to each other? Define each component.

2. You are the network administrator for a company that has a peer-to-peer network. How would the pieces and components of this network relate to each other? Define all of the components of this type of network.

3. You are the administrator of a client-server environment. What kind of network would you install and how would the pieces and components of this network relate to each other? Define each component of a typical client-server environment.

1) The network that I would install is a LAN network. With this network I would have an Operating System, Computers, Ethernet cables, Server, Hub, Printers and Network Adaptors. I will have a server which will be my central computer for all the data. The Hub will be connected to the Server which is where all the Ethernet cables from all the computers will be connected so that everyone has access to the internet as well as to the Operating System. The Network Adaptors will be hooked to all the computers in order to plug the Ethernet cables to all the computers. The computer will have the network adaptor connected and to it will be connected an Ethernet cable. The other end of the Ethernet cable will connect to the hub and then the hub will be connected to another network adaptor which is connected to another Ethernet cable which runs to the server. By having the network set up this way server will be able to set up who has access to what things on their computer by setting levels of security on each

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Access to the company network will be secured by multiple firewalls set up with our routers. Firewall filters will be set up with a specific list of allowed users and programs. All other traffic will be blocked by default until it has been approved by IT. There will be a limited number of wireless access points around the building, with password access. These passwords will be changed on a regular basis. Access to the local network will be secured by user authentication passwords. Users will be limited to only the system resources that they absolutely need to complete their work. Users’ passwords must be changed every 90 days.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    However, the insecurity can be solved by using the RIP protocol for information that is less sensitive to the network design (Lathem et el, 2006). Similarly, when the information is redistributed, the traffic may be overwhelming. But the network administrators will have to divide the traffic so that all the routers can each carry their weight of the information. The problems with the flow of traffic will be fixed and distributed through the routers. Each router will be used for certain information and that way the routers will not be overworked. Also the security will be set up so that all confidential information goes through those securities enabled routing protocol. Internet will be purchased internet from the best vendor nearby like Verizon. In the design a router will be installed in each office and lab, then configure them to operate on the network with appropriate security configuration. Finally, the internet connection would come from those routers and all the labs and offices would run on that…

    • 674 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 1 Case Study

    • 825 Words
    • 4 Pages

    When configuring windows networking, two major approaches are valid to secure all the network resources, the workgroup approach and the Domain approach. The workgroup approach is simply to create a windows peer-to-peer network with a decentralized security system. This workgroup security approach…

    • 825 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    There are two very important tools to use in Networking. They are Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP). These help keep your Network organized while building it. A DNS is a system used to name computers and network services that is organized into a hierarchy of domains. It can help locate computers and services through user names. Dynamic Host Configuration Protocol allows a server to automatically assign IP addresses to a computer from a certain range of numbers configured for that network. These two tools work as the foundation for IT-Management.…

    • 370 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ISSC340 Week1Assignment

    • 286 Words
    • 1 Page

    The architectural components of a LAN are utilized to describe to network. They include the network's physical topology, how the nodes access it. The transmission technique and whether it is wired or wireless. Other factors are the protocols utilized to talk over the network and whether it shares information with other networks. As far as physical components go you have to look at switches, routers, servers, and clients. Other items are added to these depending on the size of the network in question.…

    • 286 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    ITN Final Chp 7 Through 12

    • 7250 Words
    • 75 Pages

    As discussed in this textbook, three layers of a network model are the components required for a typical network, including local area networks.…

    • 7250 Words
    • 75 Pages
    Satisfactory Essays
  • Good Essays

    IT205 Week 4 Assignment

    • 641 Words
    • 2 Pages

    The way the system is installed where I work is Internet is set with a LAN to WAN. I have a space where I utilize email trade, server controls enact registry. Now with the LAN server with a activate directory set permission control for user and the system administrator is responsible for the performance and operation. Are Administrator sign me to a computer this is one form of security here. Another way to prevent people from coming to the server or network, For example if we have important information it will go through a router then you will have a firewall this will prevent people from interring are network. Also every employee in the company as a CAT card, A CAT card as a pin number associate with every employee. This pin number allow you access the computer and also getting in the building but the mean point with the CAT card allow you to access computer and emails. By this will let the company know whom using the computer and access the web and emails. It prevents dishonesty with the company. Now getting that out the way I will explain what I do for work.…

    • 641 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 3

    • 2062 Words
    • 9 Pages

    An enterprise level company wishes to set up a network to support several hundred business users as well as manufacturing equipment in a new building. Describe what network device or devices you would recommend they purchase and explain why. Note, you are not required to detail the media or topology utilized, but thinking about these will help you to choose and justify your device choices. I would suggest the purchase of a rack system with two servers on large server to handle the few hundred computers and users and the other to handle the manufacturing equipment. This would give them choices for backups and file sharing between one another. The servers…

    • 2062 Words
    • 9 Pages
    Good Essays
  • Satisfactory Essays

    NT1210 Final Exam Review

    • 1591 Words
    • 9 Pages

    7. What is the piece of hardware that allows a device to physically access a network?…

    • 1591 Words
    • 9 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It 240 Week 2 Appendixb

    • 565 Words
    • 3 Pages

    A peer-to-peer network is a network where each workstation has equivalent capabilities and responsibilities. In this type of network there is no dedicated server, each workstation acts as a server and they share the responsibilities that a single dedicated server would. Each workstation is allowed to access all information allowed by the owners of each workstation. Each…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Netw410 Week 2 Lab

    • 393 Words
    • 2 Pages

    To complete the Week 2 Lab Report, answer the questions below concerning the Network Design Lab Scenario found in Doc Sharing.…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It282 Week 6 Checkpoint

    • 724 Words
    • 3 Pages

    Hardware: To link all of the computer systems you will first have to determine if the connection will be wired or wireless. If wired, Ethernet cabling is best. If going wireless because of convenience note it is slower than 100 Mbps Ethernet and can be subject to interference.…

    • 724 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    8. Most networks use ________ to dynamically assign addresses and configure computers to use them. DHCP…

    • 440 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Networking basics

    • 519 Words
    • 3 Pages

    Describe what is meant by soft skills and explain why they are important in networking projects…

    • 519 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    course study guide

    • 1397 Words
    • 6 Pages

    2. Networking is about give and take. Why is this important? What do you have to offer the members in your network?…

    • 1397 Words
    • 6 Pages
    Satisfactory Essays