Premium Essay

Issc 340: Local Area Network Technologies

In: Computers and Technology

Submitted By patsfan058
Words 1522
Pages 7
Case Study 2
January 24, 2013
ISSC 340: Local Area Network Technologies
American Military University

This document is a proposal for a full network solution to support multiple users and services at the America One Car (AOC) dealership located in Washington DC. The following will include a description of recommended internet service provider (ISP), network cable and infrastructure to include all network equipment, i.e. routers, switches, wireless access points, file and storage server, print server and email server. It also includes the proposed number of network wall drops in each office, the number of phones both VoIP and POTS, total number and type of workstations, and total number and types of printers. This will address the best solution that will meet the company needs while keeping the total cost as low as possible without hindering the network performance.
First we will discuss the recommended internet access method and the minimum recommendation for you ISP. The best option for a small business with the possibility of future expansion would be to use a commercial service provider. It is recommended that you use an Ethernet internet that will provide you with a fast, reliable solution that is cost effect and easily upgradable if required. Windstream offers a dedicated Ethernet line with bandwidth speeds up to 1Gbps, having a dedicated Ethernet connection will allow for uninterrupted network access that will not be affected by other users during high traffic hours, this will be the most efficient and cost effective solution. The ISP will provide the Ethernet connection where it will be met by a firewall to add a layer of network security. The firewall will be utilized to restrict access to authorized personnel only.
From the Firewall the network will be configured as a star topology a with a layer 3 Cisco device as the focal point of the…...

Similar Documents

Premium Essay

Local Area Network

... Step by Step Guide to Setup LAN for Internet Cafe and Homes Creating a Local Area Network is very easy. You can either hire someone to do it for you or do it yourself. In both cases the guide that follows comes handy. It teaches you how setup a LAN for your home or office or Internet cafe. LAN is a network of connected computers and it can be used to organize a LAN party with your friends so you can enjoy multi-player games with them. In business it can help you share files between computers and share a single Internet connection. Other uses of LAN are sharing Internet connection with neighbours and reducing the cost for everyone in the neighbourhood. Requirements: 1) UTP Cat-5 Cables [pic] UTP Cat-5 Cables 2) RJ-45 Connectors [pic] RJ-45 Connectors 3) Crimping tool [pic] Crimping tool 4) Cable stripper [pic] Cable stripper 5) Broadband router [pic] Broadband Router 6) Switch [pic] LAN Switch 1. Choose a central location for the switch and the Broadband router 2. The cables from each outlet will reach the switch so locating the switch along with the router at the center of the network is the best option to save the cable lengths. Place the router and the switch close to each other. 3. Measure the distance of each computer from the switch. 4. Prepare cables to connect the computers with the switch. 1. Cut the required length of the cable. 2. Strip it up to 2 inches with the stripper from one end 3. Arrange the cables......

Words: 924 - Pages: 4

Premium Essay

Vlan Virtual Local Area Network

...VLAN Virtual Local Area Network Introduction: A VLAN (Virtual Local Network) is a network of computers that behave as though they are connected to the same wire even though physically they may be located on different segments of the LAN. VLAN are configured through software rather than hardware. This is a big advantage to VLAN because that makes it flexible and when moved physically it can stay on the same VLAN without any hardware configuration. (http://www.webopedia.com) A VLAN has three major functions: 1. Limited the size of broadcast domains. 2. Improves network performance. 3. Provides a level of security. VLAN Switched Port and Configuration: Using a switched VLAN will allow you to create groups of logically network devices that act as though they are on their own independent network. And this includes if they share a common infrastructure with other VLANs. When you configure a VLAN, you must sign it a number ID and you also have the option of name it. The purpose of VLAN implementations is to associate ports with particular VLANs. You configure the port to forward a frame to a specific VLAN. A port can be configured to support these VLAN types: Static VLAN, Dynamic VLAN, and, Voice VLAN. (http://www.orbit-computer-solutions.com) VLAN Trunking: VLAN trunking enables the movement of traffic to different parts of the network configured in a VLAN. A trunk is a point-to-point link......

Words: 572 - Pages: 3

Free Essay

Contrasting Web Browsers and Local-Area Networks

...Browsers and Local-Area Networks Using Quaketail T. Lam Abstract Many electrical engineers would agree that, had it not been for virtual machines, the practical unification of Scheme and semaphores might never have occurred. After years of confirmed research into 802.11 mesh networks, we disconfirm the visualization of SMPs. In our research we verify that operating systems and access points are mostly incompatible. Quaketail is not able to be visualized to manage lambda calculus. The shortcoming of this type of approach, however, is that linked lists and Web services are never incompatible. We emphasize that Quaketail turns the encrypted archetypes sledgehammer into a scalpel. The effect on steganography of this has been adamantly opposed. Combined with metamorphic modalities, it harnesses a Bayesian tool for synthesizing redundancy. Leading analysts continuously analyze the refinement of Internet QoS in the place of redundancy [16] [16]. The shortcoming of this 1 Introduction type of solution, however, is that Byzantine fault tolerance can be made low-energy, cerDistributed configurations and IPv6 have tifiable, and scalable [30, 24]. We emphasize garnered tremendous interest from both in- that our heuristic is NP-complete. Clearly, formation theorists and information theorists Quaketail harnesses 802.11 mesh networks. in the last several years. We emphasize that Here, we make two main contributions. our algorithm simulates the construction of wide-area networks, without......

Words: 2613 - Pages: 11

Free Essay

Local Area Network

...Local Area Networks Vorlesung Prof. Dr. Michael Tüxen Klausurenzusammenfassung • • • • • 2005 2006 2008 2009 2010 Keine Garantie gegen Fehler! Inhalt 1 2 3 OSI Modell .............................................................................................................................................................................................. 4 Schichten angeben und Protokolle SMTP, TCP, IP (IP-Suite) zuordnen. ............................................................................................. 4 Grafische Darstellung der Protokolle ...................................................................................................................................................... 4 Kommunikationsarten ............................................................................................................................................................................ 4 3.1 Anycast .............................................................................................................................................................................................. 4 3.2 Unicast ............................................................................................................................................................................................... 5 3.3 Broadcast .............................................................................................................................................................

Words: 1548 - Pages: 7

Premium Essay

Body Area Networks

...Healthcare IT Emerging Technology Body Area Networks; Device Interference Suppression Kimberly Miller PSIS 4199 Fall 2013 The advances in microelectronics and wireless networking are contributing to the evolution of medical devices once thought of as science fiction into clinical reality. Ultra-small medical sensors/actuators worn or implanted inside the body have the capability to collect or deliver a variety of medical information and services. The networking ability between these body devices and the possible integration with existing IT infrastructure could allow them to transmit health-related information between the user's location and the healthcare service provider. This opportunity for greater physical mobility can directly translate into a significantly better healthcare experience; and therefore, higher quality of life. Body Area Network (BAN) is the technology that allows communication between ultra-small and ultra-low power intelligent sensors/devices mentioned above. The wearable or implantable nodes can also communicate to a controller device that is located in the vicinity of the body. These radio-enabled sensors can be used wirelessly to continuously gather a variety of important health and/or physiological data that is critical to providing care. Radio-enabled implantable medical devices allow us to further pursue applications that can revolutionize care delivery including smart pills for precision drug delivery,......

Words: 473 - Pages: 2

Free Essay

Network Technology

...A network switch is a small hardware device that joins multiple computers together within one local area network (LAN). Ethernet switch devices were commonly used on home networks before home routers became popular; broadband routers integrate Ethernet switches directly into the unit as one of their many functions. High-performance network switches are still widely used in corporate networks and data centers. Advantages Switches have increased available network bandwidth. There is reduced workload on individual computers. Increased network performance. There are fewer packet collisions. And some disadvantages are: They are significantly more expensive. Network problems can be difficult to trace through a switch. Broadcast traffic. Below is a diagram showing how switchg/hub are interconnected in a network A hub is a device for connecting machines into a network. It is a non-intelligent connection but tends to be very cheap. It allows all machines to send packets to every machine connected and wait for the required machine to reply. This causes delays as all the ports are used for every transmission. A network switch is the more recent method. This has intelligence and remembers which machines are connected to each port, so it passes any transmission straight to the correct port. This reduces collisions on the network when it is busy and is therefore much faster. It is more expensive, although nowadays there is very little difference in price. A......

Words: 1379 - Pages: 6

Premium Essay

Issc 340 Caase Study

...Car dealership company, in the suburbia of Washington D.C, I would have to take a close look at creating a network that not only fills the needs of this small business, but does not come at an extreme cost. Creating this network will need to take into consideration both the security of the company tradecraft, but also the security of sensitive customer data stored on the premises. Since the company is relatively small, DSL will be the choice of internet acces Building the Local Area Network for the AOC dealership will have to focus on the small size of the business. The company currently doesn’t employ many people and an overabundance of technology might also take away from that small business feel to the company. Looking at the company, it is broken up into different sections: The sales department, management, sales floor and service department. Previous conversations with the AOC general manager alluded to the fact that most available technology needed to be in the hands of the sales associates and service department didn’t need desktop computers. So the current breakdown of desktop computers is one desktop computer for the general manager, four computers for the sales and finance office and four more computers on the sales floor. One technology that I was able to convince the general manager of undertaking was the use of WiFi. While the idea of security of a WiFi network can always be a concern, I assured him that the WiFi would be used to enhance the customer experience......

Words: 917 - Pages: 4

Premium Essay

Fundamentals of Local Area Network

...another room. In addition, they want to utilize the network for television DVR, VoIP phone, and game console. Describe what network device or devices you would recommend they purchase and explain why. Also describe the media utilized. Note, you are not required to detail the topology utilized, but thinking about this will help you to choose and justify your device choices. a. Describe what network device or devices are recommended for purpose for the given home network scenario(s). For a family who wishes to connect several devices to share and Internet connection and a Bluetooth wireless printer, I would recommend that family procure a wireless router, a modem, and a few CAT5e Ethernet cables. b. Explain the recommendations justifying why these would suit the needs for the network The family has several devices that need internet connectivity; the recommendations I made will make this happen. The modem connects to a wireless router, via plugging the broadband into the WAN port of the router, and the router will access the Internet through a unique IP address (assigned by the ISP). This will then provide local IP addresses for all of the devices connected to it, allowing the family to get Internet out to all of the devices (both wired and wireless). An advantage of having a wireless router is that it provides more safety, compared to connecting your broadband directly to your computer, because your computer's local IP addresses aren’t visible to the Internet, which......

Words: 1210 - Pages: 5

Free Essay

Voice over Wireless Local Area Network

...Voice over Wireless Local Area Network In this week’s report I will be discussing how voice traffic is went over a typical wireless local network. I will also provide information on what the advantages to using a wireless network, the problems associated with using a wireless network and what are the best solutions in overcoming these issues. A Wireless Voice network or VoWLAN (Voice over WLAN) is how we send digital voice traffic over a wireless broadband network. The type of wireless set up is basically VoIP sent over a WiFi Access Point. Within the industry this type of VoIP set up is call VoWLAN or WiFi VoIP because it uses the standards set for transporting data by the IEEE 802.11 for wireless technology. In order to use this technology we have to use a VoWLAN enabled device; the most common device on the main stream market is the PDA. There are other devices available like the WiFi handset which looks like a cell phone, but it allows voice data packets sent over the network rather than the normal analog voice signal. One of the other major enterprise level devices is not a device at all. It is software based and is loaded on to a workstation or laptop. This type of software is call softphone. It is a virtual phone that routes call through the WLAN AP to the VoIP gateway or IP PBX. There are some advantages and disadvantages to using this type of technology. One of the major advantages is cost a majority of user have WiFi hotspot available in order to stay connected.......

Words: 661 - Pages: 3

Free Essay

Submission to Local Network Cib

...ASSESMENT 2 – Report By Brenda Widjaja Lala Director, Corporate Communications South Africa HSBC Mandela Rhodes Place Cnr Wale Burg Street Cape Town South Africa April 23, 2012 Mrs. Grace Executive of the Local Network 3rd Floor, MPF House 32 Princess of Wales Terrace Sunnyside Office Park Park town Dear Mrs. Anne Marie Gutierrez, Executive of the Local Network Submission to Johannesburg the Local Network of South Africa This proposal is presented to the local network of South Africa in order to against human rights and environment cases. According to the United Global Compact, HSBC strives to encourage the changes of human rights and environmental cases to the better side. HSBC is supporting to the first of ten principles which is “Business should support and respect the protection of internationally proclaimed human rights” and also the eighth principles which says that “Business should undertake initiative to promote greater environmental responsibility” (Ten Principles 2012). In 2007, HSBC has encouraged the changes in the environmental cases by cooperating with First Direct, they plant for more than 20.000 trees in each country (First direct 2010). They also encourage their customers to switch to use online banking. More than one million of HSBC and First Direct customers switch to use online banking. On the other hand, there is a risk of doing this system. More than 3.1 million customers are left from the HSBC members (Espiner 2006).......

Words: 1350 - Pages: 6

Premium Essay

Lab7 Wide Area Networks

...Wide-Area Networks | | | David | 4/30/2014 | | Exercise 7.1.1: Owning the entirety of a WAN is impractical for an organization because there are no limitations and they can be custom built to the organization. It is favorable for the organization to maintain a LAN for expansion purposes. Exercise 7.1.2: On a WAN there is no absolute limit for the distance of a leased line. Table 7-1 WAN Physical Media Media | Infrastructure | Summary | UTP | Phone lines | Uses copper lines between all locations, limited speed with the lines. Already in place, can be very cheap to use | Coaxial | Television cable | Must run cable to all locations, can carry much higher speeds than Telco. Is a little more expensive to run. Needs boosters at specific distances | Fiber-optic | Glass cables with POP’s at specific distances | Uses a customized infrastructure to run dedicated connections: this is a costly option | Electric power lines | Power lines. They are everywhere and the infrastructure is already there | This type of media can be used with Broadband over Power Lines (BPL), making use of the extensive infrastructure in place already | Table 7-2 WAN Wireless Media Media | Summary | Satellite | Not very fast, has a delay of about 1 second, very costly to use. Uses a star topology | Imax (Worldwide Interoperability for Microwave Access) | This has 75Mbps speeds and can transmit for distances up to 30 miles. It is designed for metropolitan areas.......

Words: 784 - Pages: 4

Premium Essay

Auditing Local Area Network

...NIST The purpose of this publication is to provide organizations with recommendations for improving the Security configuration and monitoring of their IEEE 802.11 wireless local area networks (WLANs) and their devices connecting to those networks. The scope of this publication is limited to unclassified wireless networks and unclassified facilities within range of unclassified wireless networks. This publication supplements other NIST publications by consolidating and strengthening their key recommendations, and it points readers to the appropriate NIST publications for additional information (see Appendix C for the full list of references and Appendix A for a list of major security controls relevant for WLAN security). This publication does not eliminate the need to follow recommendations in other NIST publications, such as [SP800-48] and [SP800-97]. If there is a conflict between recommendations in this publication and another NIST wireless publication, the recommendation in this publication takes precedence. NIST Special Publication 800-53 is part of the Special Publication 800-series that reports on the Information Technology Laboratory’s (ITL) research, guidelines, and outreach efforts in information system security, and on ITL’s activity with industry, government, and academic organizations. Specifically, NIST Special Publication 800-53 covers the steps in the Risk Management Framework that address security control selection for federal information systems in......

Words: 1201 - Pages: 5

Premium Essay

Issc 340 Assingment 2

...Grade) Lesson 2 Review: Wide Area Networks The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. What is a T1 circuit? (Word count: 15-25) A T1 circuit is the most common connectivity method in the United States and Japan and it is 24 different channels of voice and data that carries signals at a speed of up to 1.544 mbps 2. A statistical multiplexer provides each user with … (Word count: 15-25) The ability to have a faster connection depending on the transmission trends by switching between channels according to the demand of the network 3. What does a SONET add/drop multiplexer do? (Word count: 15-25) It provides the capability to add or drop part of the transmission payload without the overhead of completely demultiplexing and remultiplexing the entire signal. 4. Describe an ATM cell … (Word count: 15-25) It is a data frame that is always 53 bytes long that serves as the basic unit of ATMs packets switching technology 5. Which technologies provide affordable high-speed connections for home-based networks? (Word count: 15-25) There are three main methods of connecting to the internet that is available for an affordable price. Cable Internet which is the most common, and reliable this method provides a good amount of speed for a reasonable price. DSL connections is the cheapest high speed connection that can get up to 100mbps with xDSL. Lastly the new technology called Fiber to......

Words: 302 - Pages: 2

Premium Essay

Network Design for a Local Business

...Network Design for A local Business Name: Course: Instructor: Institution: Date of Submission: Network Design for A local Business The world is moving towards technology, therefore, each and every business whether local or international need to have a well equipped and reliable network. Network design simply ensures that a new technological service satisfy the various needs of the operators and also the subscribers. A network design involves connections of different devices with some end systems, for example, computers or mobile phones and servers that can link to each other well (Juan, 2004). However for our case various locations or departments in our local business need to relate or communicate to each other to provide smooth flow of information. When designing a network for a company we require equipment such as the physical components. These components are the hard drive devices, and they form a computer network through interconnection. Therefore, we shall vary the number and size of these physical components to the size of the network that the business requires. However, our local business has little number of employees of approximately 50 people. In computer network design there are mainly four major physical components. These components have been placed in categories that include but not limited to personal computers (PCs), routers, switches and lastly the interconnections. However, to implement this network design, the following equipment are...

Words: 1355 - Pages: 6

Premium Essay

Local and Wide Area Networks

...Local Area and Wide Area Networks The complex nature of today’s local and wide area networks requires a great deal of planning before the network can be assembled and configured. Identifying and implementing network security is a key area of concern due to the large variety of network vulnerabilities that can be exploited by both malicious and external users. Additionally, the correct switching and routing technologies must be implemented to ensure the efficiency and availability of the network. A network can reach its peak security and efficiency only when these factors are fully considered and correctly configured in the network. Security Hardware and Software One of the primary concerns in the development of a network is introducing and configuring the proper security hardware and software. One of the primary tools in ensuring the security of a modern network is the implementation of a network firewall. A network firewall is designed to allow or deny packets entry or exit to the network based on user defined rules (Beal, n.d.). Traffic can be allowed or denied entry to the network based on a variety of criteria. Traffic can be inspected and allowed, based on IP, port number, application, or its entry or exit security level (Beal, n.d.). For these reasons the internal network will be guarded by the Cisco ASA 5512-X Firewall. The ASA 5512 firewall provides up to 1Gbps throughput with stateful packet inspection with is sufficient to support the maximum speed of the......

Words: 1253 - Pages: 6

Jason Martell | Economic Opportunities - 734 Words | Le Monde du Camping-Car – 01.04.2018