Premium Essay

Intro to Network Magement

In: Computers and Technology

Submitted By cecerob09
Words 407
Pages 2
IT245-1202A-01 : Introduction to Network Management
Network Configuration
Candice Robinson
04/23/2012

Table of Contents

Target Organization………………………………………………………………….…3
Network Architecture…………………………………………………………………..4
Network Model……………………………………………………………………………….5
Network Security……………………………………………………………………………...6
Network Protocols…………………………………………………………………………….7
Network Management………………………………………………………………………...8
References……………………………………………………………………………………..9

Target Organization

Name of Business: CR Media

Locations: Fayetteville, NC; Greensboro, NC and New Port News, NC and a website.

Number of employees: 22

Business History: CR Media is a business that provides rentals of video games and movies. The business came to life in December of 2011 and is in the process of becoming established. Movies and Games can be rented via the internet and mailed to the home address in addition to visiting a physical location in the above mentioned cites.

Network Architecture

The network architecture that will be used for the organization will be the client/server network. A client/server network would be more suitable because this is a business that is growing thus it will be easier to make changes and additions to the network. A WLAN Star Topology is going to be used because it will be cost effective and will allow room for future growth. The client/server network will be composed of Windows 2000 File Server, Exchange Server and Firewall Server. We plan to connect 17 users in three locations with 5 users in our main location. Internet access would be controlled through the main location. We also hope to add a Citrix Server and will be linking the locations using a VPN solution with mobile users.

Network Model

TBD Layer 3: Session: Router
Layer 3: Session: Router

Reeivers: Monitors 1, 3, 4, 5
Reeivers: Monitors 1, 3, 4, 5 Layer…...

Similar Documents

Premium Essay

Intro to Networking

...NT-1210 Intro to Networking 05/30/2012 CH 10-11 Research Paper Essay In the evolution of smart phones the first use of text messaging did not take place until 1992 in England, and this was from a computer to a cell phone. The first cell phone to cell phone text happened in 1993 in Finland, which during this period was leading the cell phone technology race, and in 2000 was the first to offer mobile news services. In this time period of the early 2g (second generation) and 2.5g networks mobile providers started to pop up everywhere making communications more reliable. In 2001 the 3g network was introduced and with this technology came the ability to send pictures and stream video. Mobile providers started to offer media content such as ringtones, news, weather, jokes, music and videos, which in 2007 reached 31 billion in sales and outpaced computer internet sales. In the business aspect of this technology, all of this is the icing on the cake. The ability to keep in touch with your employees at any time or location is priceless. Gone are the days of the travelling salesperson with only the information that was current when they began their journey. Changes to information or current events can be sent immediately, lost files can be sent, up to date sales figures can be accessed and video conferencing is possible. A new application being researched for business use is Unified Messaging, a system that offers access to E-mail, voice and fax messages though a unified......

Words: 430 - Pages: 2

Free Essay

Network

...13 Agent-Oriented Novel Quantum Key Distribution Protocol for the Security in Wireless Network Xu Huang, Shirantha Wijesekera and Dharmendra Sharma University of Canberra Australia 1. Introduction Wireless security is becoming increasingly important as wireless applications and systems are widely adopted. Numerous organizations have already installed or are busy in installing “wireless local area networks” (WLANs). These networks, based on the IEEE 802.11 standard, are very easy to deploy and inexpensive. Wi-Fi allows LANs to be deployed without cabling for client devices, typically reducing the costs of network deployment and expansion. As of 2007 wireless network adapters are built into most modern laptops. The price of chipsets for Wi-Fi continues to drop, making it an economical networking option included in ever more devices. Wi-Fi has become widespread in corporate infrastructures, which also helps with the deployment of RFID technology that can piggyback on Wi-Fi. WiFi is a global set of standards, unlike mobile telephones, any standard Wi-Fi device will work anywhere in the world. Other important trends in wireless adoptions are including the introduction of wireless email with devices such as the Blackberry and The Palm VII, rampant digital cell phone use, including the use of short message service (SMWS), and the advent of Bluetooth devices. But the risks associated with the adoption of wireless networking are only now coming to light. A number of impressive......

Words: 6431 - Pages: 26

Premium Essay

Networks

...Networks are hardware, software, and media that can be used to connect computers together allowing them to communicate, exchange information and share resources. Networks allow multiple users to access shared data and programs. There are five kinds of networks; LAN, WAN, CAN, MAN, and HAN. The two main types of networks are LAN and WAN. LAN stands for local area network, and WAN stands for wide area network. According to our text “A local area network (LAN) is a data communication system consisting of several devices such as computers and printers.” (The McGraw−Hill Companies, 2006). These devices are physically connected to one another by cables, wireless media, or infrared links. Any network within a building or several that are next to each other is a LAN. A WAN, also known as a wide area network is made up of two or more LAN’s geographically connected. An example of a WAN is when a company or business located in one place has its main offices in one place and other smaller parts of the company in other places all data is shared within the network. There are also three types of hybrid networks, CAN’s, MAN’s, and HAN’s. A CAN or campus area network is like a LAN but on a bigger scale and more diversified, allowing different campus offices and organizations to be linked. For example, at a college the registrar’s office is connected to the bursar’s office. MAN’s which are metropolitan area networks are a large type of network that connects many corporate LANs together.......

Words: 370 - Pages: 2

Premium Essay

Networks

...TYPES OF COMPUTER NETWORKS Maninder Kaur professormaninder@gmail.com What is Network? • A network consists of two or more computers that are linked in order to share resources (such as printers and CDs), exchange files, or allow electronic communications. • The computers on a network may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams. Different Types of Networks • Depending upon the geographical area covered by a network, it is classified as: – Local Area Network (LAN) – Metropolitan Area Network (MAN) – Wide Area Network (WAN) – Personal Area Network (PAN) Local Area Network (LAN) • A LAN is a network that is used for communicating among computer devices, usually within an office building or home. • LAN’s enable the sharing of resources such as files or hardware devices that may be needed by multiple users • • Is limited in size, typically spanning a few hundred meters, and no more than a mile • Is fast, with speeds from 10 Mbps to 10 Gbps • Requires little wiring, typically a single cable connecting to each device • Has lower cost compared to MAN’s or WAN’s Local Area Network (LAN) • LAN’s can be either wired or wireless. Twisted pair, coax or fibre optic cable can be used in wired LAN’s. • Every LAN uses a protocol – a set of rules that governs how packets are configured and transmitted. • Nodes in a LAN are linked together with a certain topology. These topologies include: – Bus – Ring –......

Words: 611 - Pages: 3

Premium Essay

Network

... fwuashie@ug.edu.gh Nationality  : GhanaianDate of Birth: 22nd June, 1981 | | ------------------------------------------------- Profile I am industrious, goal-oriented, focused and ambitious person with Computer Hardware & Networking, and Microsoft Certified System Engineering background. I have a dedicated insight into the needs and views of others, and the ability to identify issues or crisis areas and form inventive information technology solutions. My areas of strength include; Networking and System Administration/Security Objectives I aspire to become a Network Systems Security Analyst and Database Administrator and to work in a demanding, competitive, fulfilling and an exciting environment to bring out the best in me. ------------------------------------------------- Education And Professional Qualification Certification Status | Credential | Certification / Version | | Date Achieved | | Ubiquiti airMAX & Unifi Wi-Fi Training | airMAX Certified & Unifi Wi-Fi | | April 12, 2013 | | Modules: * Understanding Wireless Communication * Active Server Pages * Link Planning and ManagementMicrosoft Certified Technology Specialist | Administrator. * Ubiquiti Protocols and Technologies * Hands-on UniFi Campus WIFI Course * RF......

Words: 774 - Pages: 4

Premium Essay

It245-Intro to Network Management

...Introduction to Network Management Phase 5: Network Security & Network Management Network User Guide Final Version Gabriel B. Del Fierro IT245-1304B, Introduction to Network Management Instructor: Brian Rodgers December 23, 2013 Executive Summary The purpose of this user guide is to familiarize you the Casa Del Fierro organization, what their needs are within this Network Organization. Contained in the following pages will provide you with all of the pertinent information that you will need in order to provide the highest quality of service and care. “An ounce of prevention is better than a pound of cure” – B. Franklin.   Table of Contents IT245-1303B-01 Network Project Plan Executive Summary 1 Table of Contents 2 Section 1: Introduction of the Organization and its Requirements 4 Section 2: Network Architecture Design 6 Section 3: Network Model or Stack to be Used 8 Section 4: Network Protocols 15 Section 5: Network Security 19 Section 6: Network Management 22 References 24 Section 1: The Organization & It’s Network Requirements The Casa Del Fierro is a small organization with a total of two main users with a few friends and family that comes to visit on holidays. Although this network is set up in a comfortable home, individual needs may vary. The internet is used on a daily basis, Streaming Movies along with music, Online School, Social Media, Games, Online Banking and accessing medical care records. The devices to be networked...

Words: 5562 - Pages: 23

Free Essay

Network

...Network Attached Device Network-attached storage (NAS) is a dedicated hard disk storage device that is set up with its own network address and provides file-based data storage services to other devices on the network. It is attached to a local area network and assigned an IP address, allowing both application programming and files to be served faster because they are not competing for processor resources. NAS devices are usually configured with a web browser and do not have a keyboard or display. Consists of hard disk storage, including multi-disk RAID systems and can usually handle a number of network protocols, including Microsoft's Internetwork Packet Exchange and NetBEUI, Novell's Netware Internetwork Packet Exchange, and Sun Microsystems' Network File System. (Rouse, 2013) NAS devices speed is typically one gigabit Ethernet connection but this can be changed to multiple gigabit, 10 gigabit, fiber optic by adding a pci-e network card(s). Older parts can be used which may be limited to 10/100 megabit. If you need an exact answer for speed, simply look at the wiki on gigabit. The capacity range varies, people have built 40 TB (terabyte) machines and other just have 2TB. With port replication and add on hard drive controller cards there is hardly a limit on size. A board with 6 SATA ports can be replicated (1 to 5 port) allowing for 30 drives to be attached, if 3TB drives were used in raid 50 that would be 72TB of storage. As far as fault tolerance, raid 50...

Words: 703 - Pages: 3

Free Essay

Intro

...Student: ASHLEY KRUEGER Instructor: McGraw - Hill Course: Connect For Education Connect Lucas GENERIC Sp10 - CFE Title: Ashley Krueger Specific Purpose: My purpose is to inform my audience about growing up and who I am now. Central Idea: Intro Sensitive, caring-sometimes too much, gets frustrated easily, honest, respectful, unfocused, and worrisome. These are just a handful of my traits and what makes me, me. I have learned many things over the last few years that have determined the type of person I want to be and who I don't. I have my good days and definitely my bad days, but all of these have helped me learn and grow. I will be letting you know of 4 different things about me. Where I come from, they type of person I was heading towards, how I have changed over the last few years and the type of person I want to be. Body I was born and raised in Springfield, Mo. It was my sister and I until I was 8, we wished and wished for my parents to have a baby boy. Well my mom got pregnant, but it was another girl. So we got a sister. At the age of 14 my parents got a divorce and since then I have gained a step-bro and sis and a half sis. It is a lot of fun for the most part having a big family because you always have someone to lean on and talk to. I am the oldest so I of course had the most responsibility and have had people that look up to me; I needed to be a good role model. I feel like I have done an okay job, with the exception of......

Words: 1112 - Pages: 5

Free Essay

Networks

...Case: You are appointed as a technical expert to implement a network system for a small size maritime supplyrepresentative company with four users. The company provides supply services to Maritime shipping companies through a worldwide network of suppliers. Its owner is a maritime business expert who doesnot know much about the use of computer systems to support her business. Therefore, she has decidedto employ you as a consultant on a short term basis to set-up appropriate systems in a network. She hasheard about various technologies and the efficiency achieved by computer systems and would welcomeadvice on the acquisition of hardware, software and network items to augment her existing systems inorder to meet the company’s growing needs. The company has a budget of £100,000 for this project. The company currently consists of the following departments (all located in the same open space office): The sales Manager who is responsible for dealing with Maritime companies. She is assisted by asales assistant, equipped with a laptop but with no ability to access the web. This department iscurrently the only one with a connection to the Internet and with access to the company’s commonemail.  The General Manager who is responsible for the general operation of the company. She tradeswith suppliers all over the world in order to ensure the best prices of goods for the company’sMaritime shipping clients. For client communication, she uses plain telephone services and a faxmachine....

Words: 545 - Pages: 3

Free Essay

Intro

...2Lesson 2: Wide Area Networks (WANs) Objectives By the end of this lesson, you will be able to:   Describe the characteristics and functions of wide area networks (WANs). Define basic signaling and transmission terminology, including analog and digital signals, Digital Signal Level Zero (DS0), broadband, baseband, multiplexing, and Digital Signal Hierarchy (DSH). Distinguish between circuit switching and packet switching, and identify various circuit-switching and packet-switching technologies. Describe the characteristics and performance of dial-up connections, including POTS and Integrated Services Digital Network (ISDN). Describe the characteristics and performance of direct connections, including leased T-carrier and E-carrier lines, cable Internet, Digital Subscriber Line (DSL), LAN connections, and fiber to the x (FTTx). Describe the characteristics and functions of Synchronous Optical Network (SONET). Describe the characteristics and functions of Asynchronous Transfer Mode (ATM).      2-2 Local Area Networks (LANs) Pre-Assessment Questions 1. Which of the following is faster than T1? a. b. c. d. 2. E1 ISDN BRI DS0 DS1 Which type of transmission uses a single channel? a. b. c. d. Broadband Digital Subscriber Line (DSL) Baseband Cable modem 3. How are digital signals measured? © 2012 CertPRESS, a division of Certification Partners, LLC — All Rights Reserved. Version 7.0 Lesson 2: Wide Area Networks......

Words: 9984 - Pages: 40

Free Essay

Intro to Network

...unencrypted format. Identify the purpose, features, and functions of the following network components: • Hubs • Switches • Bridges • Routers • Gateways • CSU/DSU • Network interface cards (NICs), ISDN adapters, and system area network cards • Wireless access points (WAPs) • Modems A wide range of devices are used in modern networking. As a Network+ certified technician, you will need to have a good understanding of commonly used devices. Given an example, identify a Media Access Control (MAC) address. MAC addresses are the means by which systems communicate at a base level. As a network administrator, you will need to understand the purpose, function, and expression of MAC addresses. Outline • Introduction • Hubs • Switches • Switching Methods • Working with Hubs and Switches • Hub and Switch Ports • Cables Connecting Hubs and Switches • Hub and Switch Indicator Lights • Rack Mount, Stackable, and Freestanding Devices • Managed Hubs and Switches Typically, a local area network exists in a house or a university campus, while a wide area network exists over many office buildings separated by a vast distance. The office buildings in a WAN may be in different countries or even continents. For example, the headquarters may be in USA, the regional office may be in the UK, and the branch office may be in India. The workers in these three buildings use a Wide Area Network to collaborate with each other. The Internet can also be considered as a WAN, with......

Words: 1464 - Pages: 6

Premium Essay

It245 Intro to Network Management

...IT245 IP5 Introduction to Network Management Individual Project Carol McClellan February 10, 2014 Contents Identifying the Network 4 The Company Considered 4 The Networks Considered 4 Servers Applied 4 Roles of Network managers 4 Diagramming the Network 5 Legend for the Diagram 5 Diagram 6 Network Models 7 The Seven Layers of the OSI Model 7 Physical Layer 7 Data Link Layer 7 Network Layer 7 Transport Layer 7 Session Layer 8 Presentation Layer 8 Application Layer 8 FCAPS 9 Fault Management 9 Configuration Management 9 Accounting 10 Performance 10 Security 10 Protocols and Agents 12 Transport Layer 12 Application Layer 12 Presentation Layer 13 Session Layer 13 Network Layer 13 Data Link Layer 14 Physical Layer 14 Network Security 15 Network Management2 16 FOOTNOTES 18 Identifying the Network The Company Considered I have decided to use Walmart for my individual project. It is an international company with 11,137 retail units in twenty-seven countries on five continents. It employs over two million people around the world. The Networks Considered There are numerous networks that would be needed for an international company such as this. In addition to the ones used nationally, there would be others in relation to language and monetary differences and shipping differences. There would also be a more extensive requirement as far as tariffs and taxes. Some of the national ones would be......

Words: 5551 - Pages: 23

Free Essay

Network

...Network Access Control (NAC) is a computer networking solution that uses a set of protocols to define and implement a policy that describes how to secure access to network nodes by devices when they initially attempt to access the network.[citation needed] NAC might integrate the automatic remediation process (fixing non-compliant nodes before allowing access) into the network systems, allowing the network infrastructure such as routers, switches and firewalls to work together with back office servers and end user computing equipment to ensure the information system is operating securely before interoperability is allowed. A basic form of NAC is the 802.1X standard. Network Access Control aims to do exactly what the name implies—control access to a network with policies, including pre-admission endpoint security policy checks and post-admission controls over where users and devices can go on a network and what they can do. When a computer connects to a computer network, it is not permitted to access anything unless it complies with a business defined policy; including anti-virus protection level, system update level and configuration. While the computer is being checked by a pre-installed software agent, it can only access resources that can remediate (resolve or update) any issues. Once the policy is met, the computer is able to access network resources and the Internet, within the policies defined within the NAC system. NAC is mainly used for endpoint health checks, but......

Words: 294 - Pages: 2

Free Essay

Intro to Networking

...Intro to Networking Lab 3 Jeff Garwood EX. 3.1 Review 1. The MAC Address is sufficient to route traffic locally because it provides the needed information with regards to the equipment location. This is mostly true on level 2 networks. 2. The Open Systems Interconnection was started in two documents in 1978. The International Organization for Standardization (ISO) and the International Telegraph and Telephone Consultative Committee, or CCITT. In 1983 these two documents were combined as the basic reference model for the OSI. It was created so Protocols could allow the entity in one host to interact with a corresponding entity at the same layer in another host. 3. The TCP dates back into the 1960s on the DOD sponsored ARPANET. In 1973 the TCP/IP came to be and consisted of dozens of different protocols. Of these key protocols, two are usually considered the most important. The Internet Protocol (IP) is the primary OSI network layer (layer three) protocol that provides addressing, datagram routing and other functions in an internetwork. EX. 3.2 Review 1. The composition of the physical wiring, and connectors no matter the type are strictly regulated to ensure the electrons within the communications signal can move fast enough to maintain a connection. The addition of network devices such as switches and routers complete the campus style network. 2. The OSI model is not implemented in a network but is used as a model to guide troubleshooting a local network in......

Words: 719 - Pages: 3

Free Essay

Intro to Programming

...Unit 3: Lab 3.1 Course Intro to programming Instructor : Sindar Lab 3.1 Lab 3.1 Step 1 Identify potential problems. Variable Name Problem Yes/No if yes, what’s wrong? Declare Real credits Taken No Declare Int cedits Left Yes We need to be able to use decimal as well. Declare Real studentName No Constant Real creditsNeeded=90 No Step 2 What’s wrong with this calculation Set credits-Left = credits-Taken – credits-Needed It should be: Set credits-Left = credits-Needed – credits-Taken Step 3 Write the exact output you would expect from the following code if the user of the program enters “John Brown”. Display “The student’s name is “, studentName Output will be “The student’s name is, John Brown Step 4 Write the exact output from the following line of code if user of the program enters John Brown and they have taken 20 credits so far. Display “The Network Systems Administration degree is awarded after 90 credits and “, studentName, “ has “, creditsLeft, “ left to take before graduation.” Output “ The Network Systems Administration degree is awarded after 90 credits and John Brown has 70 left to take before graduation. Step 5 1. //Provide documentation on line 2 of what this program does 2. //This program displays student information and degree program information 3. //Declare variables on lines 4, 5, 6, and 7 4. //Declare Real studentName 5. //Declare Real...

Words: 300 - Pages: 2